示例#1
0
	def test_dns_hijacker(self):
		arp_instance = sm.grab('poisoners.arp', target=self.target)

		arp_instance.print_target_ip()

		dns_hijacker = sm.grab('poisoners.dns', target=self.target, webserver_ipv4='192.168.1.4')
		dns_hijacker.start()
示例#2
0
	def test_syn_dos(self):
		port_scanner = sm.grab('scanners.syn', target=self.target)
		port_scanner.start(verbose=True)

		syn_dos = sm.grab('dos.syn', target=self.target, target_ports=port_scanner.open_ports)
		syn_dos.start()
示例#3
0
	def test_null_scan(self):
		null_scan_instance = sm.grab('scanners.null', target=self.target)
		null_scan_instance.start(verbose=True)
示例#4
0
	def test_ack_scan(self):
		arp_scan_instance = sm.grab('scanners.ack', target=self.target)
		arp_scan_instance.start(verbose=True)
示例#5
0
	def test_xmas_scan(self):
		xmas_instance = sm.grab('scanners.xmas', target=self.target)
		xmas_instance.start(verbose=True)