Course contentsShow
Security
Lesson 370 of 3,0528. Network Security - ReconnaissancePro lesson

Decoy Scanning and IP Spoofing

Generate decoy traffic and spoof source addresses to obscure the true origin of reconnaissance activities.

This lesson is for subscribers

You've completed the free preview. Subscribe to unlock every lesson in every course.