Skip to content

Haksell/ft_nmap

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ft_nmap

mandatory

  • The executable must be named ft_nmap.
  • A help menu must be available.
  • You must only manage a simple IPv4 (address/hostname) as parameter for your scans.
  • You must manage FQDN however you don’t have to make the DNS resolution.
  • It must be possible to choose the number of threads (default:0 max:250) to make the scan faster
  • It must be possible to read a list of IPv4 addresses and hostname from a file. (parsing good, execution bad)
  • Your program must be able to run the following scan: SYN
  • Your program must be able to run the following scan: NULL
  • Your program must be able to run the following scan: ACK
  • Your program must be able to run the following scan: FIN
  • Your program must be able to run the following scan: XMAS
  • Your program must be able to run the following scan: UDP
  • If the scan type is not specified then all scan types must be used.
  • We must be able to run each type of scan individually, and several scans simultaneously.
  • The ports to be scanned can be read as a range or individually.
  • In the case no port is specified the scan must run with the range 1-1024.
  • The number of ports scanned cannot exceed 1024.
  • The resolution of service types will be requested (not the version but only the TYPE).
  • The result of a scan should be as clean and clear as possible. The time frame should be easy to read.

bonus

  • Ping (latency)
  • Reverse DNS
  • CIDR ranges
  • --no-randomize
  • --no-ping
  • --top-ports
  • -sW SCAN_WIN
  • -sC SCAN_CONN
  • UDP probes
  • --udp-rate
  • Various spoofs (Ctrl+F random_u32_range)
  • --spoof-address

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published