I implement pistol
host discovery according to the nmap documentation.
| Methods | Detailed Documentation | Notes | | :------------------- | :---------------------------------------------------------------------------------------------- | :------------------------------ | | [x] TCP SYN Ping | nmap references | | | [x] TCP ACK Ping | nmap references | | | [x] UDP Ping | nmap references | | | [x] ICMP Ping | nmap references | | | [x] ARP Scan | nmap references | | | [ ] IP Protocol Ping | nmap references | Complicated and not very useful |
I implement pistol
transport layer scan according to the nmap pdf and documentation.
| Methods | Detailed Documentation | Notes | | :---------------------- | :---------------------------------------------------------------------------- | :-------------------------------------- | | [x] TCP SYN Scan | nmap references | | | [x] TCP Connect() Scan | nmap references | | | [x] TCP FIN Scan | nmap references | | | [x] TCP Null Scan | nmap references | | | [x] TCP Xmas Scan | nmap references | | | [x] TCP ACK Scan | nmap references | | | [x] TCP Window Scan | nmap references | | | [x] TCP Maimon Scan | nmap references | | | [x] TCP Idle Scan | nmap references | | | [x] IP Protocol Scan | nmap references | | | [x] UDP Scan | nmap references | | | [ ] TCP FTP Bounce Scan | nmap references | The bugs exploited have long been fixed |