Kernel module to detect various types of TCP scans generated using nmap. It uses netfilter framework and intercepts TCP recon packets.
Scans tested
- NULL Scan
nmap -sN ip P - FIN Scan
nmap -sF ip P - XMAS Scan
nmap -sX ip P - ACK Scan
nmap -sA ip P
ip = ip of destination machine. P = any port of destination machine.
Run using make and clean using make clean.
See kernel logs using dmesg info or tail /var/log/kern.log.
- In nmap scans, for example
nmap -sA localhost Xlocalhost and port X can be used for checking that the kernel module is setup properly. - UFW or any other firewall should be put down, as it may block some of the nmap scans.
sudo service ufw stop