I am trying to understand how the decoy option work under nmap,
isn't that true that if you are port scanning someone with decoy
option in nmap, the return packet log on victim system can tell whos
receiving the information and thus hacker can be tracked down.
what the hell is the decoy option good for then.