OR (when you have already known which remote TCP port is open, such as TCP135 in the following example):
#nmap -O -v -n 135 10.50.97.10
Below shows that the aforementioned machine can be a zombie for Nmap's Idle Scan:
IP ID Sequence Generation: Incremental
No comments:
Post a Comment