Feature: simple nmap attack (sanity check)
Background:
Given "nmap" is installed
And the following profile:
| name | value |
| hostname | example.com |
Scenario: Verify server is available on standard web ports
When I launch an "nmap" attack with:
"""
nmap -p 80
"""
Then the output should contain:
"""
80/tcp open http
"""
Created
November 3, 2012 06:11
Sample gauntlt attack
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment