mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-10 13:44:12 +00:00
Merge pull request #7 from cclauss/patch-1
print() is a function in Python 3
This commit is contained in:
commit
ed0848ea1d
1 changed files with 24 additions and 18 deletions
|
@ -5,12 +5,18 @@
|
|||
# basic TCP port scanner using python.
|
||||
#####################################################################
|
||||
|
||||
from __future__ import print_function
|
||||
|
||||
import socket, subprocess,sys
|
||||
import socket, subprocess, sys
|
||||
|
||||
subprocess.call('clear',shell=True)
|
||||
try:
|
||||
raw_input # Python 2
|
||||
except NameError:
|
||||
raw_input = input # Python 3
|
||||
|
||||
print '''\t
|
||||
subprocess.call('clear', shell=True)
|
||||
|
||||
print('''\t
|
||||
___ __ __ _ ___ _ ___
|
||||
/ _ \| \/ | /_\ | _ ( ) __|
|
||||
| (_) | |\/| |/ _ \| //\__ \
|
||||
|
@ -22,35 +28,35 @@ print '''\t
|
|||
\__ \ (__ / _ \| .` | .` | _|| /
|
||||
|___/\___/_/ \_\_|\_|_|\_|___|_|_\\
|
||||
|
||||
'''
|
||||
''')
|
||||
|
||||
target_ip = raw_input("\t Please enter the IP address of the target host:")
|
||||
port_1 = int(raw_input("\t Enter the first port to scan:\t"))
|
||||
port_2 = int (raw_input("\t Enter the last port to scan:\t"))
|
||||
print "~"*50
|
||||
print "\n ...scanning target now. ",target_ip
|
||||
print "~"*50
|
||||
target_ip = raw_input("\t Please enter the IP address of the target host:").strip()
|
||||
port_1 = int(raw_input("\t Enter the first port to scan:\t").strip())
|
||||
port_2 = int(raw_input("\t Enter the last port to scan:\t").strip())
|
||||
print("~"*50)
|
||||
print("\n ...scanning target now. ", target_ip)
|
||||
print("~"*50)
|
||||
|
||||
try:
|
||||
for port in range(port_1,port_2):
|
||||
sock= socket.socket(socket.AF_INET,socket.SOCK_STREAM)
|
||||
for port in range(port_1, port_2):
|
||||
sock= socket.socket(socket.AF_INET, socket.SOCK_STREAM)
|
||||
socket.setdefaulttimeout(1)
|
||||
|
||||
result = sock.connect_ex((target_ip,port))
|
||||
result = sock.connect_ex((target_ip, port))
|
||||
if result==0:
|
||||
print "Found open port:\t", port
|
||||
print("Found open port:\t", port)
|
||||
sock.close()
|
||||
|
||||
except KeyboardInterrupt:
|
||||
print "[!] Scan stopped by user... "
|
||||
print("[!] Scan stopped by user... ")
|
||||
sys.exit()
|
||||
|
||||
except socket.gaierror:
|
||||
print "[!] The target's hostname could not be resolved..."
|
||||
print("[!] The target's hostname could not be resolved...")
|
||||
sys.exit()
|
||||
|
||||
except socket.error:
|
||||
print "[!] Target is unreachable..."
|
||||
print("[!] Target is unreachable...")
|
||||
sys.exit()
|
||||
|
||||
print "The scan is complete. Happy hacking!"
|
||||
print("The scan is complete. Happy hacking!")
|
||||
|
|
Loading…
Reference in a new issue