Use decoy IP addresses to obscure the source
The following command is used to perform a decoy scan on the specified target system(s) using the provided decoy IP addresses. When you run this command, Nmap will send spoofed packets from the specified decoy IP addresses along with the real scan packets. This can make it more difficult for the target system(s) or network devices (such as firewalls or intrusion detection systems) to determine the true source of the scan, as they will see traffic coming from multiple IP addresses.
Command :
nmap -D <decoy1,decoy2,...> <target>
Top 30 Basic NMAP Commands for Beginners
For a cybersecurity enthusiast or professional, mastering network scanning tools is very important to comprehend and assess the security position of networks and systems. Nmap, an influential and versatile Network Mapper, is the network reconnaissance and vulnerability detection go-to tool. As you begin your journey in ethical hacking or work towards developing your penetration testing skills, it is imperative to learn the key Nmap commands. The following 30 Nmap basic commands will provide a good starting point for scanning networks efficiently, finding live hosts, discovering opened ports, as well as obtaining useful details on services hosted on those machines. With Nmap in your toolbox, you will be armed with the necessary tools not just to understand the intricacies of network exploration but also to uncover any possible vulnerabilities that could breach security within the digital landscape.