Skip to content

Commit

Permalink
Images Link fix on NetGun Page
Browse files Browse the repository at this point in the history
  • Loading branch information
Carlo-Colizzi committed Feb 27, 2024
1 parent 6a5bf13 commit 14d1034
Showing 1 changed file with 13 additions and 1 deletion.
14 changes: 13 additions & 1 deletion _posts/2022-06-03-NetGun.md
Original file line number Diff line number Diff line change
Expand Up @@ -31,32 +31,44 @@ pip install -r requirements.txt

## How to Use
Here you can set the details of the scan

![details](https://raw.githubusercontent.com/Carlo-Colizzi/NetGun/main/source_code/persistence/storage/assets/scan_details.png)


You can set IPv4 and Port range

![IPv4 and Port range](https://raw.githubusercontent.com/Carlo-Colizzi/NetGun/main/source_code/persistence/storage/assets/set_ip_and_ports.png)


Choose the protocol used by the researched services, TCP or UDP

![TCP or UDP](https://raw.githubusercontent.com/Carlo-Colizzi/NetGun/main/source_code/persistence/storage/assets/protocol.png)


Choose the Advanced Options:
- **OS detection**: let to discover the OS used by the Target<
- **Disable PING**: during the scan the ping functionality will not be used
- **SYN scan**: SYN scan is the default and most popular scan option for good reason. It can be performed quickly, scanning thousands of ports per second on a fast network not hampered by intrusive firewalls. SYN scan is relatively unobtrusive and stealthy, since it never completes TCP connections.
- **ACK scan**: Its probe packet has only the ACK flag set. When scanning unfiltered systems, open and closed ports will both return a RST packet. NetGun then labels them as unfiltered, meaning that they are reachable by the ACK packet, but whether they are open or closed is undetermined. Ports that don't respond, or send certain ICMP error messages back, are labeled filtered.

**Important:** you can't use SYN scan and ACK scan together

![Advanced Options](https://raw.githubusercontent.com/Carlo-Colizzi/NetGun/main/source_code/persistence/storage/assets/advanced_options.png)


Choose the scan mode:
- **SHALLOW**: a shallow and stealth scan, do not look for services version
- **DEEP**: a deep scan, look also for services version

![Scan Mode](https://raw.githubusercontent.com/Carlo-Colizzi/NetGun/main/source_code/persistence/storage/assets/set_deep_or_shallow.png)


Choose the scan aggressivity, from 0 (slow and stealth) to 4 (fast)

![Aggressivity](https://raw.githubusercontent.com/Carlo-Colizzi/NetGun/main/source_code/persistence/storage/assets/scan_aggressivity.png)

When the scan terminate, you will see the results in such a table:

When the scan terminates, you will see the results in a table:
![Results](https://raw.githubusercontent.com/Carlo-Colizzi/NetGun/main/source_code/persistence/storage/assets/scan_result.png)


Expand Down

0 comments on commit 14d1034

Please sign in to comment.