I implement pistol
host discovery according to the nmap documentation.
Methods | Detailed Documentation | Notes |
---|---|---|
[x] TCP SYN Ping | namp references | |
[x] TCP ACK Ping | namp references | |
[x] UDP Ping | namp references | |
[x] ICMP Ping | namp references | |
[x] ARP Scan | namp references | |
[ ] IP Protocol Ping | namp references | Complicated and not very useful |
I implement pistol
transport layer scan according to the nmap pdf and documentation.
Methods | Detailed Documentation | Notes |
---|---|---|
[x] TCP SYN Scan | nmap references | |
[x] TCP Connect() Scan | nmap references | |
[x] TCP FIN Scan | nmap references | |
[x] TCP Null Scan | nmap references | |
[x] TCP Xmas Scan | nmap references | |
[x] TCP ACK Scan | nmap references | |
[x] TCP Window Scan | nmap references | |
[x] TCP Maimon Scan | nmap references | |
[x] TCP Idle Scan | nmap references | |
[x] IP Protocol Scan | nmap references | |
[x] UDP Scan | nmap references | |
[ ] TCP FTP Bounce Scan | nmap references | The bugs exploited have long been fixed |