Inspect the nmap_frag_fw_bypass.pcapng file, part of this module's resources, and enter the total count of packets that have the TCP RST flag set as your answer.
Open nmap_frag_fw_bypass.pcapng in Wireshark and set the display filter:
nmap_frag_fw_bypass.pcapng
tcp.flags.reset == 1
Last updated 3 months ago