nmap_comprehensive_scan
Execute a thorough network scan using all detection methods, including port scanning, service discovery, and OS fingerprinting, to assess network security and identify vulnerabilities.
Instructions
Perform comprehensive scan with all detection methods
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| include_scripts | No | ||
| ports | No | all | |
| targets | Yes |
Implementation Reference
- server.py:201-219 (handler)The main handler function that executes the comprehensive Nmap scan, including SYN scan, service version detection, OS detection, optional default scripts, on specified targets and ports.async def nmap_comprehensive_scan( targets: str, ports: str = "all", include_scripts: bool = True ) -> str: """Perform comprehensive scan with all detection methods.""" args = ["-sS", "-sV", "-O", "-p", ports] if include_scripts: args.append("--script=default") args.append(targets) result = run_nmap_command(args, timeout=600) # Longer timeout for comprehensive scan if result["success"]: return f"Comprehensive scan completed:\n\n{result['stdout']}" else: return f"Comprehensive scan failed:\n\n{result['stderr']}"
- server.py:197-200 (registration)Registers the 'nmap_comprehensive_scan' tool with FastMCP app using the @app.tool decorator, specifying name and description.@app.tool( name="nmap_comprehensive_scan", description="Perform comprehensive scan with all detection methods" )
- server.py:202-205 (schema)Input schema defined by function parameters with type hints: targets (str), ports (str, default 'all'), include_scripts (bool, default True), returns str.targets: str, ports: str = "all", include_scripts: bool = True ) -> str: