Idle/bounced scan to disguise source
The following command is used to perform an idle/zombie scan on the specified target system(s) using the provided zombie host. When you run this command, Nmap first verifies that the specified <zombie host> meets the criteria for an idle system (i.e., it has no active connections and has not sent any packets recently). Then, it spoofs packets from the idle system to scan the target system(s). The responses from the target system(s) are sent back to the idle system, allowing Nmap to infer which ports are open or closed based on the changes in the idle system’s behavior.
Command :
nmap -sI <zombie host> <target>
Top 30 Basic NMAP Commands for Beginners
For a cybersecurity enthusiast or professional, mastering network scanning tools is very important to comprehend and assess the security position of networks and systems. Nmap, an influential and versatile Network Mapper, is the network reconnaissance and vulnerability detection go-to tool. As you begin your journey in ethical hacking or work towards developing your penetration testing skills, it is imperative to learn the key Nmap commands. The following 30 Nmap basic commands will provide a good starting point for scanning networks efficiently, finding live hosts, discovering opened ports, as well as obtaining useful details on services hosted on those machines. With Nmap in your toolbox, you will be armed with the necessary tools not just to understand the intricacies of network exploration but also to uncover any possible vulnerabilities that could breach security within the digital landscape.