Nmap Spoofing NSOCK ERROR and TCP Out-Of-Order

I’ve recently tried out the following nmap command on my Kali Linux virtual machine with Nmap 7.91,

nmap -sS -e eth0 -S 12.12.12.12 192.168.0.102

I was trying to perform a SYN scan with a spoofed IP of 12.12.12.12 on to my host computer with WireShark on it. Upon doing it I received this error:

NSOCK ERROR (0.2750s) mksock_bind_addr(): Bind to 192.168.0.105:0 failed (IOD #1): Cannot assign requested address (99)

Yet, checking on my WireShark, the spoofing works. So I’m kinda confused as to what this is.

Additionally, being new to this, when checking WireShark during scanning, a lot of prompts saying TCP-Out-Of-Order is received. I get that it means the TCP frames sent are not in order, but if a network administrator sees this it be quite obvious someone was scanning. Is there a way to prevent this? Or is this something experienced with using a VM?

Thanks!

nmap nsock engines epoll | kqueue | poll | select – Information security stack exchange

Battery exchange network

The Stack Exchange network consists of 174 question and answer communities that include Stack Overflow, the largest and most reliable online community for developers to learn, share their knowledge and develop their careers.

Visit Stack Exchange