Skip to content

Commit 6dade12

Browse files
committed
Update docs
1 parent 8a39e50 commit 6dade12

File tree

3 files changed

+8
-8
lines changed

3 files changed

+8
-8
lines changed

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -91,10 +91,10 @@ The modules packaged with the utility are listed in the table below.
9191
| Module | Description |
9292
| --------- | ----------------------------------------------------------------------------- |
9393
| `c2-dns` | Generates a list of current C2 destinations and performs DNS requests to each |
94-
| `c2-ip` | Connects to 10 random current C2 IP:port pairs to simulate egress sessions |
94+
| `c2-ip` | Connects to random current C2 IP:port pairs to simulate egress sessions |
9595
| `dga` | Simulates DGA traffic using random labels and top-level domains |
9696
| `hijack` | Tests for DNS hijacking support via ns1.sandbox.alphasoc.xyz |
97-
| `scan` | Performs a port scan of 10 random RFC 1918 addresses using common ports |
98-
| `sink` | Connects to 10 random sinkholed destinations run by security providers |
97+
| `scan` | Performs a port scan to random RFC 5737 addresses using common ports |
98+
| `sink` | Connects to random sinkholed destinations run by security providers |
9999
| `spambot` | Resolves and connects to random Internet SMTP servers to simulate a spam bot |
100100
| `tunnel` | Generates DNS tunneling requests to \*.sandbox.alphasoc.xyz |

simulator/scan.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ import (
1010
var (
1111
scanPorts = []int{21, 22, 23, 25, 80, 88, 111, 135, 139, 143, 389, 443, 445, 1433, 1521, 3306, 3389, 5432, 5900, 6000, 8443}
1212

13-
// IP ranges are for TEST-NET-[123] networks, as per RFC5737.
13+
// IP ranges are for TEST-NET-[123] networks, as per RFC 5737.
1414
// These IPs should be safe to scan as they're not assigned.
1515
scanIPRanges = []*net.IPNet{
1616
{
@@ -72,7 +72,7 @@ func (*PortScan) Simulate(ctx context.Context, extIP net.IP, host string) error
7272
return nil
7373
}
7474

75-
// Hosts returns host:port generated from RFC 1918 addresses.
75+
// Hosts returns host:port generated from RFC 5737 addresses.
7676
func (s *PortScan) Hosts(size int) ([]string, error) {
7777
var hosts []string
7878

simulator/spambot.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -59,12 +59,12 @@ var domains = []string{
5959
// Spambot simulator.
6060
type Spambot struct{}
6161

62-
// NewSpambot creates port scan simulator.
62+
// NewSpambot creates a Spambot simulator.
6363
func NewSpambot() *Spambot {
6464
return &Spambot{}
6565
}
6666

67-
// Simulate port scanning for given host.
67+
// Simulate connects to SMTP server provided in host.
6868
func (*Spambot) Simulate(ctx context.Context, extIP net.IP, host string) error {
6969
d := &net.Dialer{
7070
LocalAddr: &net.TCPAddr{IP: extIP},
@@ -78,7 +78,7 @@ func (*Spambot) Simulate(ctx context.Context, extIP net.IP, host string) error {
7878
return nil
7979
}
8080

81-
// Hosts returns host:port generated from RFC 1918 addresses.
81+
// Hosts returns random SMTP servers.
8282
func (s *Spambot) Hosts(size int) ([]string, error) {
8383
var (
8484
hosts []string

0 commit comments

Comments
 (0)