Update scapscan.py

This commit is contained in:
santosomar 2019-03-31 16:24:15 -04:00
parent 4e8069450a
commit 63d3c205c7

View file

@ -169,7 +169,6 @@ def start(your_target,your_ports,your_timeout):
def banner(): def banner():
bannerTxt = """ bannerTxt = """
************************************************************ ************************************************************
#### #### ## ##### #### #### ## # # #### #### ## ##### #### #### ## # #
# # # # # # # # # # # # ## # # # # # # # # # # # # # ## #
#### # # # # # #### # # # # # # #### # # # # # #### # # # # # #
@ -177,35 +176,12 @@ def banner():
# # # # # # # # # # # # # # ## # # # # # # # # # # # # # # ##
#### #### # # # #### #### # # # # #### #### # # # #### #### # # # #
A demonstration by Omar Santos on how to use scapy for scanning purposes. Part of the Cybersecurity classes at: https://h4cker.org
SCAPY SCANNER This tool supports TCP Connect Scans, Stealth Scans, XMAS Scans, FIN Scans, NULL Scans, ACK Flag Scans, Window Scans, and UDP Scans.
A demonstration by Omar Santos on how to use scapy
for scanning purposes. Part of the Cybersecurity classes at:
https://h4cker.org
The following scan types are processed:
- TCP Connect Scan
- Stealth Scan
- XMAS Scan
- FIN Scan
- NULL Scan
- ACK Flag Scan
- Window Scan
- UDP Scan
usage: scapy_stealth_scan.py [-h] [-p] [-pl] [-pr] [-t] target usage: scapy_stealth_scan.py [-h] [-p] [-pl] [-pr] [-t] target
positional arguments:
target Target address
optional arguments:
-h, --help show this help message and exit
-p Single port e.g. 80
-pl Port list e.g. 21,22,80
-pr Port range e.g. 20-30
-t Timeout value (default 2)
************************************************************ ************************************************************
""" """
print bannerTxt print bannerTxt