destination IP: 192.168.10.23 destination port: 63221 source IP: 192.168.21.100 source port: 80 admin See author's posts Post navigation Using spoofed IP address to generate port responses during a scan while using a SYN flag is a technique related to: Your company has web servers, DNS servers, and mail servers in a DMZ that are accessible from the Internet. Hackers have been scanning your public IP addresses and you even suspect they have begun enumerating some targets. Your company performs daily Nessus scans to find live hosts, open ports, and vulnerabilities. The Nessus scanner is connected to your internal network. Your manager commented that he thinks a network firewall is blocking Nessus from scanning the hosts in the DMZ. What is a solution to provide Nessus with the same visibility of the DMZ as that of a hacker?