twice! - AVTOKYO2016 HIVE(Vuls v0.1.6) - AVTOKYO2018 HIVE(Vuls v0.6.0) And today is the third time AVTOKYO2020 HIVE (Vuls v0.13.2) So I'm going to talk about updates around the scan between Vuls v0.6.0 and v0.13.2 9
the port used by the package with the remaining vulnerability means that the port scan destination becomes clear. That's why Vuls’s Port Scan is smart(Accurately scan to the minimum port, so fast and silently)… However, only TCP connect scan is used, and flexible port scan is not yet possible…
introduce the following two options! SCAN TECHNIQUES: -sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans -sN/sF/sX: TCP Null, FIN, and Xmas scans FIREWALL/IDS EVASION AND SPOOFING: -S <IP_Address>: Spoof source address -g/--source-port <portnum>: Use given port number 24
on the following contents - nmap support (PR#1066) - UDP port scan - Improved Vuls Native port scanner - Security Tracker is prioritized over OVAL data in Debian (PR#1053) - Update to a richer TUI 25
following (mention on Twitter or Discord) - How to operate nmap (environment, options, etc...) - What kind of function do you want with vuls port scan? https://github.com/future-architect/vuls 27