Kernel module to detect various types of TCP scans generated using nmap. It uses netfilter framework and intercepts TCP recon packets.
Scans tested
- NULL Scan
nmap -sN ip P
- FIN Scan
nmap -sF ip P
- XMAS Scan
nmap -sX ip P
- ACK Scan
nmap -sA ip P
ip = ip of destination machine. P = any port of destination machine.
Run using make
and clean using make clean
.
See kernel logs using dmesg info
or tail /var/log/kern.log
.
- In nmap scans, for example
nmap -sA localhost X
localhost and port X can be used for checking that the kernel module is setup properly. - UFW or any other firewall should be put down, as it may block some of the nmap scans.
sudo service ufw stop