@slow @announce Feature: nmap attacks for www.devsecops.cc Background: Given "nmap" is installed And the following profile: | name | value | | hostname | www.devsecops.cc | | tcp_ping_ports | 80,443 | Scenario: Using tcp syn ping scan and the nmap fast flag When I launch an "nmap" attack with: """ nmap -F -PS -oX shiny.xml """ Then the file "shiny.xml" should contain XML: | css | | ports port[protocol="tcp"][portid="80"] state[state="open"] | | ports port[protocol="tcp"][portid="443"] state[state="open"] |