Nmap Decoy Scans

Learn how to perform an Nmap decoy scan.

Decoy scans can be used to evade detection by security systems and maintain anonymity while performing a scan. The need for decoy scans arises when a network administrator or security system uses IDSs or firewalls that monitor and block incoming traffic.

Let’s explore how we can perform Nmap decoy scans.

What is an Nmap decoy scan?

Nmap allows users to specify multiple decoy IP addresses that will be used along with the actual source IP address of the scan. This is useful for disguising the scan’s origin and evading detection by an IDS. ...

Get hands-on with 1400+ tech skills courses.