public/subjects/cybersecurity/active
Mikk Rätsep 541e287360 Flags sre most likely in wrong order for the audit file
- It makes more sense for the flag -p (short for 'ports') to be before the port range
- It makes more sense for the flags -u or -t (short for 'UDP ports' and 'TCP ports') to be either freely placed where-ever or to be placed before the 'ip_address' argument, but not before the port range argument.
This mistake happened only inside the audit questions file, it seems to be fine in the task description file.
2024-03-04 10:58:25 +00:00
..
audit Flags sre most likely in wrong order for the audit file 2024-03-04 10:58:25 +00:00
README.md docs(cybersecurity): add warning to advise that projects are for educative purposes only 2023-03-31 15:57:51 +03:00

README.md

Active

Objective

In this project you will have to make a simple port scanner, which will tell you if the port is open or closed. You must create the project from scratch.

Advice

https://en.wikipedia.org/wiki/Nmap

Bonus

Show the name of the service that uses the port

Usage

$>  tinyscanner --help
Usage: tinyscanner [OPTIONS] [HOST] [PORT]
Options:
  -p               Range of ports to scan
  -u               UDP scan
  -t               TCP scan
  --help           Show this message and exit.
$>  tinyscanner -u 20.78.06.364 -p 80
Port 80 is open
$> tinyscanner -t 127.0.0.1 -p 1604
Port 1604 is closed
$> tinyscanner -t 10.53.224.5 -p 80-83
Port 80 is open
Port 81 is open
Port 82 is close
Port 83 is open

Submission and audit

Files that must be inside your repository:

  • Your program source code.
  • a README.md file, Which clearly explains how to use the program.

Dont hesitate to double check the names of your folders and files to ensure they are correct!

⚠️ These methods and tools are for educational purposes only, so that you have a better understanding of how to protect against similar vulnerabilities. You must ensure that you do not attempt any exploit-type activity without the explicit permission of the owner of the machine, system or application. Failure to obtain permission risks breaking the law.