Question
Inspect the nmap_frag_fw_bypass.pcapng file, part of this module's resources, and enter the total count of packets that have the TCP RST flag set as your answer.
Open nmap_frag_fw_bypass.pcapng in Wireshark and set the display filter:
tcp.flags.reset == 1Last updated