What port scanning method involves sending spoofed packets to a target system and then looking
for adjustments to the IPID on a zombie system?
A.
Blind Port Scanning
B.
Idle Scanning
C.
Bounce Scanning
D.
Stealth Scanning
E.
UDP Scanning
Explanation:
From NMAP:
-sI <zombie host[:probeport]> Idlescan: This advanced scan method allows for a truly blind TCP
port scan of the target (meaning no packets are sent to the tar- get from your real IP address).
Instead,a unique side-channel attack exploits predictable “IP fragmentation ID” sequence
generation on the zombie hostto glean information about the open ports on the target.