Nmap Development mailing list archives

Re: Status Report #1 of 17


From: Brandon Enright <bmenrigh () ucsd edu>
Date: Mon, 27 Apr 2009 20:26:54 +0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

kx,

I think this is a good idea.  There have been several times when I have
used perl+tcpdump+hping2 to script up some automated task.

That is, I'll open tcpdump as a pipe with something like:

open(TCPDUMP, '-|', $tcpdump_command)

And then I'll do a while (<TCPDUMP>) to read results, and then based on
the results, I'll run hping2 with some flags.  I solved the DefCon CTF
2008 "Binary Leetness 200" problem with this trick (see
http://nopsr.us/ctf2008qual/walk-binary.html#200 for the problem).

I've also used perl+hping+tcpdump to snipe TCP connections of people
abusing wireless at hotels and conferences.

I've never used the scapy python library but I think anybody that is
going to try to make nping scriptable should think about how scapy
works and if it would be good to borrow from that design/api/feature
set.

Brandon


On Mon, 27 Apr 2009 21:53:16 +0200
kx <kxmail () gmail com> wrote:

This is more of a ramble than a good idea, and please know that I
haven't looked at nmap source in over 2 years.  However...

I know that hping3 added Tcl support for scripting, and I had wondered
if nmap, ncat and nping all share the same core packet sending
libraries, would it be possible to design nping to be able to run NSE
scripts as well? That is probably well over the scope for this summer,
but I thought it might be worth considering if it would impact design
choices this summer.

The biggest thing I am thinking of is being able to take advantage of
all the NSE libraries at the least.

Again, I haven't looked at code, so NSE scripts might be dependent on
nmap data structures that would make this unfeasible, but I thought it
was at least worth mentioning.

If the saner, more competent folks on the list could weigh in...

Cheers,
  kx


On Mon, Apr 27, 2009 at 10:33 AM, Luis M. <luis.mgarc () gmail com>
wrote:
Hi!

First of all, let me introduce myself. My name is Luis
MartinGarcia, and I am one of the 6 Nmap GSoC '09 students. I study
Computing Engineering in University Carlos III, Madrid, Spain, and
I am also pursuing my masters degree in Information Security in
Open University of Catalonia.

My project for Nmap is the development of Nping, a hping-like tool
for for constructing and sending custom packets. I am open to any
suggestion about the project, so don't hesitate to contact me if
you have interesting ideas.


Accomplishments:

*  I've checked out most or all nmap repository (main branch,
nmap-exp, status, etc).
*  I've created a new directory in nmap-exp for this GSoC Project
(folder "luis")
*  I've created a TODO list in directory status (file "TODO.luis")
*  I've successfully compiled current svn version of nmap. That was
easy since there is no difference with the standard process for
tar.gz releases.
*  I've downloaded hping2 and started having a look at its man page.
*  I've subscribed to the nmap-svn list (I was already subscribed
to the other lists)


Priorities:

* Read as much hping2 documentation as possible
* Discussion with Fyodor and the nmap-dev people about the
requirements for Nping.
* Tell Fyodor I don't have access to an OS X box to be used for
testing.


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.11 (GNU/Linux)

iEYEARECAAYFAkn2FRQACgkQqaGPzAsl94ISwwCfbnkYPX6pDE/7nONrk0WeJCSp
lt4AnjmXJCu3l9jPAka8SmqT7BqKciuc
=7wtl
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org

Current thread: