Nmap Development mailing list archives

Re: Please help test WDB/VxWorks NSE script


From: Daniel Miller <bonsaiviking () gmail com>
Date: Mon, 16 Aug 2010 10:12:51 -0500

On 08/16/2010 09:44 AM, David Fifield wrote:
On Thu, Aug 12, 2010 at 04:51:40PM -0500, Daniel Miller wrote:
It's done!

This version works (I found an Internet-accessible host to test
against), and dumps several interesting types of output. I collect more
than is output, but most of it is enumerable types that are defined in
"wdb.h" and "cputypes.h," which I cannot find anywhere. I'd appreciate
any input anyone has on this script.
Thanks, I have committed the script. I'm curious, what documentation did
you refer to when developing it? It would be nice to have a link to add
to the script.

David Fifield

David,

I used a few sources. Protocol information I got from [1], sample code (saved me a lot of testing) from the new Metasploit scanner module [2], and I also referenced some VxWorks source code (incomplete) [3].

[1] http://www-kryo.desy.de/documents/vxWorks/V5.5/tornado-api/wdbpcl/wdb.html [2] http://www.metasploit.com/redmine/projects/framework/repository/entry/lib/msf/core/exploit/wdbrpc.rb
[3]http://www.pudn.com/downloads115/sourcecode/embed/detail486003.html

Dan
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: