This is a dedicated watch page for a single video.
Danny, a black hat hacker, plans to scan the network of an organization using Nmap to identify potential vulnerabilities. He plans to use the nmap command “-D”. What is the objective of the command “-D”in nmap?