- The executable must be named ft_nmap.
- A help menu must be available.
- You must only manage a simple IPv4 (address/hostname) as parameter for your scans.
- You must manage FQDN however you don’t have to make the DNS resolution.
- It must be possible to choose the number of threads (default:0 max:250) to make the scan faster
- It must be possible to read a list of IPv4 addresses and hostname from a file. (parsing good, execution bad)
- Your program must be able to run the following scan: SYN
- Your program must be able to run the following scan: NULL
- Your program must be able to run the following scan: ACK
- Your program must be able to run the following scan: FIN
- Your program must be able to run the following scan: XMAS
- Your program must be able to run the following scan: UDP
- If the scan type is not specified then all scan types must be used.
- We must be able to run each type of scan individually, and several scans simultaneously.
- The ports to be scanned can be read as a range or individually.
- In the case no port is specified the scan must run with the range 1-1024.
- The number of ports scanned cannot exceed 1024.
- The resolution of service types will be requested (not the version but only the TYPE).
- The result of a scan should be as clean and clear as possible. The time frame should be easy to read.
- Ping (latency)
- Reverse DNS
- CIDR ranges
-
--no-randomize
-
--no-ping
-
--top-ports
-
-sW
SCAN_WIN -
-sC
SCAN_CONN - UDP probes
-
--udp-rate
- Various spoofs (Ctrl+F
random_u32_range
) -
--spoof-address