Nmap Development mailing list archives
Re: [NSE script] IPv6 RA flood
From: Adam Števko <adam.stevko () gmail com>
Date: Sun, 23 Sep 2012 22:45:10 +0200
Hi David, as promised I added more information about the RA flood vulnerability into description. I also added timeout. I did it more less the same way as in url-snarf. However, I am not sure if it the best approach performance-wise. See attached patch for more details. Feedback is welcome. I would like to add more functionality to the script, e.g packet fragmentation so it can bypass RA Guard. I will post more patches once I am done with it. Cheers, Adam
Attachment:
timeout.patch
Description:
On Sep 20, 2012, at 2:53 AM, David Fifield <david () bamsoftware com> wrote:
Adam made some changes and I committed the script from https://bitbucket.org/xenol/nse-scripts/raw/6d3ad48e6251/ipv6-ra-flood.nse. Adam, you say you will add in a default time limit. When that is ready, the best way for you to send it to us is as a patch on this mailing list. I would also like to ask you to elaborate a bit more (1 or 2 sentences) ni the description, stating which operating systems are known to be vulnerable. There should be at least one link to a vulnerability advisory or something similar. David Fifield
_______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Re: [NSE script] IPv6 RA flood David Fifield (Sep 14)
- Re: [NSE script] IPv6 RA flood David Fifield (Sep 19)
- Re: [NSE script] IPv6 RA flood Adam Števko (Sep 23)
- Re: [NSE script] IPv6 RA flood David Fifield (Sep 23)
- Re: [NSE script] IPv6 RA flood Adam Števko (Sep 23)
- Re: [NSE script] IPv6 RA flood David Fifield (Sep 23)
- Re: [NSE script] IPv6 RA flood Adam Števko (Sep 23)
- Re: [NSE script] IPv6 RA flood David Fifield (Sep 19)