- Explain how the so-called “idle scan” works with nmap. Include example command line commands. According to the nmap website, what hosts are good ones to use for zombies? 100 words minimum.
- How do the idle scan and pivoting work to hide the ethical hacker’s assessment? 100 words minimum.