Medium lab in HTB academy network enumeration with nmap

Hello there,
I’m having trouble trying to solve medium lab in the “Network enumeration with nmap” module.
So far I have tried -g for setting source port to 53, -D RND:20 for decoys, and I have tampered a little with different scripting options (-sV, --script dns-nsid, --script version…). None of this worked.
Can someone help?
I also tried to spoof my ip with -S <someRandomIp> -e tun0. However nmap seems unable to find a route to the target when I do that. I don’t know if it has anything to do with me using wsl for running the command.
Thanks in advance.

I stumbled across the answer by mistake not even following the Hack the Box guide.

I saw using nmap documentation the script for “dns-nsid”. You will find they use -sSU, and I used -T5 for this scan. Just follow the same format of the example on nmap documentation.

Then UDP appears in the results and you will be able to continue from there. looks like port 53 udp is interesting to help you finish the next lab wish is the hard lab using another tool (ncat). This is in the HTB

Firewall and IDS/IPS Evasion