diff options
| author | Greg Stupp | 2026-03-15 20:15:40 +0000 |
|---|---|---|
| committer | Greg Stupp | 2026-03-15 20:15:40 +0000 |
| commit | 9f85ce5e1937c3815a556ea26dd29d2204fa1074 (patch) | |
| tree | a7852700c138ba9532e675049e54834b752aa929 /tests/models/network/test_nmap.py | |
| parent | 459a8638924a6bc4c98eddee317e2dca59ed054b (diff) | |
| parent | 2ca391c7b38c448cc9cd3fff3da5a06d5c2ce3a1 (diff) | |
| download | generalresearch-9f85ce5e1937c3815a556ea26dd29d2204fa1074.tar.gz generalresearch-9f85ce5e1937c3815a556ea26dd29d2204fa1074.zip | |
Merges pull request #1
Feature network
Diffstat (limited to 'tests/models/network/test_nmap.py')
| -rw-r--r-- | tests/models/network/test_nmap.py | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/tests/models/network/test_nmap.py b/tests/models/network/test_nmap.py new file mode 100644 index 0000000..0be98d4 --- /dev/null +++ b/tests/models/network/test_nmap.py @@ -0,0 +1,29 @@ +import subprocess + +from generalresearch.models.network.definitions import IPProtocol +from generalresearch.models.network.nmap.execute import execute_nmap +import faker + +from generalresearch.models.network.nmap.result import PortState +from generalresearch.models.network.tool_run import ToolName, ToolClass + +fake = faker.Faker() + + +def resolve(host): + return subprocess.check_output(["dig", host, "+short"]).decode().strip() + + +def test_execute_nmap_scanme(toolrun_manager): + ip = resolve("scanme.nmap.org") + + run = execute_nmap(ip=ip, top_ports=None, ports="20-30", enable_advanced=False) + assert run.tool_name == ToolName.NMAP + assert run.tool_class == ToolClass.PORT_SCAN + assert run.ip == ip + result = run.parsed + + port22 = result._port_index[(IPProtocol.TCP, 22)] + assert port22.state == PortState.OPEN + + toolrun_manager.create_nmap_run(run) |
