aboutsummaryrefslogtreecommitdiff
path: root/tests/models/network/test_nmap.py
diff options
context:
space:
mode:
authorstuppie2026-03-13 13:31:22 -0600
committerstuppie2026-03-13 13:31:22 -0600
commitefe1c368b8b49a2c6b3bf2193a5b89eb5426eba3 (patch)
treee00bc797640fc18f3484506d6a5b752cf1c8b7f4 /tests/models/network/test_nmap.py
parentd9ab70d98624e22b87dfe40cc5e18c8ad5eb44c4 (diff)
downloadgeneralresearch-efe1c368b8b49a2c6b3bf2193a5b89eb5426eba3.tar.gz
generalresearch-efe1c368b8b49a2c6b3bf2193a5b89eb5426eba3.zip
ToolRunCommand + options models to handle cmd line args for all network tools
Diffstat (limited to 'tests/models/network/test_nmap.py')
-rw-r--r--tests/models/network/test_nmap.py29
1 files changed, 29 insertions, 0 deletions
diff --git a/tests/models/network/test_nmap.py b/tests/models/network/test_nmap.py
new file mode 100644
index 0000000..0be98d4
--- /dev/null
+++ b/tests/models/network/test_nmap.py
@@ -0,0 +1,29 @@
+import subprocess
+
+from generalresearch.models.network.definitions import IPProtocol
+from generalresearch.models.network.nmap.execute import execute_nmap
+import faker
+
+from generalresearch.models.network.nmap.result import PortState
+from generalresearch.models.network.tool_run import ToolName, ToolClass
+
+fake = faker.Faker()
+
+
+def resolve(host):
+ return subprocess.check_output(["dig", host, "+short"]).decode().strip()
+
+
+def test_execute_nmap_scanme(toolrun_manager):
+ ip = resolve("scanme.nmap.org")
+
+ run = execute_nmap(ip=ip, top_ports=None, ports="20-30", enable_advanced=False)
+ assert run.tool_name == ToolName.NMAP
+ assert run.tool_class == ToolClass.PORT_SCAN
+ assert run.ip == ip
+ result = run.parsed
+
+ port22 = result._port_index[(IPProtocol.TCP, 22)]
+ assert port22.state == PortState.OPEN
+
+ toolrun_manager.create_nmap_run(run)