In this lab, we simulate a decoy scan using Nmap’s -D option to mask the attacker’s IP address. Then we analyze the traffic in Wireshark to determine which IP is likely the real source. A valuable exercise in both offensive evasion and defensive detection. #Cybersecurity #Nmap #DecoyScan #Wireshark #EthicalHacking #NetworkSecurity #CompTIA #CyberLabs #PenetrationTesting #infosec