- Explain how the so-called idle scan works with nmap. Include example command line commands. According to the nmap website, what hosts are good ones to use for zombies? 100 words minimum.
- How do the idle scan and pivoting work to hide the ethical hackers assessment? 100 words minimum.