diff options
| author | stuppie | 2026-03-13 13:31:22 -0600 |
|---|---|---|
| committer | stuppie | 2026-03-13 13:31:22 -0600 |
| commit | efe1c368b8b49a2c6b3bf2193a5b89eb5426eba3 (patch) | |
| tree | e00bc797640fc18f3484506d6a5b752cf1c8b7f4 /tests/models/network/nmap.py | |
| parent | d9ab70d98624e22b87dfe40cc5e18c8ad5eb44c4 (diff) | |
| download | generalresearch-efe1c368b8b49a2c6b3bf2193a5b89eb5426eba3.tar.gz generalresearch-efe1c368b8b49a2c6b3bf2193a5b89eb5426eba3.zip | |
ToolRunCommand + options models to handle cmd line args for all network tools
Diffstat (limited to 'tests/models/network/nmap.py')
| -rw-r--r-- | tests/models/network/nmap.py | 29 |
1 files changed, 0 insertions, 29 deletions
diff --git a/tests/models/network/nmap.py b/tests/models/network/nmap.py deleted file mode 100644 index f034bf0..0000000 --- a/tests/models/network/nmap.py +++ /dev/null @@ -1,29 +0,0 @@ -import subprocess - -from generalresearch.models.network.definitions import IPProtocol -from generalresearch.models.network.nmap.execute import execute_nmap -import faker - -from generalresearch.models.network.nmap.result import PortState -from generalresearch.models.network.tool_run import ToolName, ToolClass - -fake = faker.Faker() - - -def resolve(host): - return subprocess.check_output(["dig", host, "+short"]).decode().strip() - - -def test_execute_nmap_scanme(toolrun_manager): - ip = resolve("scanme.nmap.org") - - run = execute_nmap(ip=ip, top_ports=20) - assert run.tool_name == ToolName.NMAP - assert run.tool_class == ToolClass.PORT_SCAN - assert run.ip == ip - result = run.parsed - - port22 = result._port_index[(IPProtocol.TCP, 22)] - assert port22.state == PortState.OPEN - - toolrun_manager.create_nmap_run(run) |
