Closed chux0r closed 11 months ago
tcpScan barebones is complete and implemented in main(); tested on tcp_test_win portlist on localhost; output nominal:
PS C:\Users\geigner\workbench\dev\golang\netscanx> go run ./main.go
Success
Error: [dial tcp 127.0.0.1:137: connectex: An attempt was made to access a socket in a way forbidden by its access permissions.]
Error: [dial tcp 127.0.0.1:139: connectex: No connection could be made because the target machine actively refused it.]
Success
Success
Success
Success
Success
Error: [dial tcp 127.0.0.1:8000: connectex: No connection could be made because the target machine actively refused it.]
Error: [dial tcp 127.0.0.1:9999: connectex: No connection could be made because the target machine actively refused it.]
TCP Connection, 3-way handshake(FULL) barebones done. See var conn *Conn
New spec: need tcpScan() to use only a single arg to accommodat channel broker.
blocker for #3 resolved: tcpScan() uses single arg
12/12 status. Done so far: TCP connect TCP full-open TCP close TCP connection error collection/handling TCP session error collection/handling Response collection
still need: TCP half open
moving TCP half-open scanning to feature: "special packet flags constructor". TCP scanning is implemented
Build and test: TCP Connect TCP Half-open TCP full-open TCP close TCP connection error collection/handling TCP session error collection/handling Response collection