Question

Inspect the nmap_frag_fw_bypass.pcapng file, part of this module's resources, and enter the total count of packets that have the TCP RST flag set as your answer.

Open nmap_frag_fw_bypass.pcapng in Wireshark and set the display filter:

tcp.flags.reset == 1

Last updated