Which of the following tools allows an attacker to intentionally craft packets to confuse pattern-matching NIDS systems
identify the port that is most likely to be open and allowed to reach the server that Carl has just compromised.