ANTS is a tcp tarpitter made with Rust.
More about ANTS: https://medium.com/sensorfu/scanners-beware-welcome-to-the-network-from-hell-86989f29f17b
Start the application with:
sudo cargo run --release -- -i <interface_name> [--passive | -p] [--log-level <level>]
Required Flags:
-i <interface_name>: Specify the network interface to use.
Optional Flags:
--passive or -p: Run in passive mode. By default, the application runs in active mode. In passive mode any responses are not sent.
--log-level : Set the logging level (debug, info, error). Defaults to info.
First create docker images of ants and nmap scanner
docker build -f ants.Dockerfile -t ants1 . && docker build -f my_nmap.Dockerfile -t my_nmap .
Then create a testnetwork
docker network create -d bridge --subnet=172.19.0.0/16 my_custom_bridge
Lastly compose and run containers
docker-compose up
After docker compose up open new terminal for interactive use of nmap
docker exec -it scanner bash
https://labrea.sourceforge.io/Intro-History.html