Nmap Development mailing list archives

Re: [NSE script] IPv6 RA flood


From: Adam Števko <adam.stevko () gmail com>
Date: Tue, 18 Sep 2012 23:43:44 +0200

Hi David,

I modified the original script. It should be Lua 5.2 friendly and interface argument is now mandatory. Could you review 
it?

URL: https://bitbucket.org/xenol/nse-scripts/src/6d3ad48e6251/ipv6-ra-flood.nse

I tested it on the latest nmap and it works.  I will add timer later.

Adam

On Sep 15, 2012, at 8:40 AM, David Fifield <david () bamsoftware com> wrote:

Hi Adam. I'm sorry this script has been ignored for so long.

I changed the script's imports to run under Lua 5.2 and tried it. It
pegged a Windows 7 CPU at 100% almost immediately, and continued to do
so after I killed the Nmap process. It works as advertised.

I'd like to add this script if you'll make just a few simple changes.
Update the code to Lua 5.2; this may be as simple as changing the
require statements. A guide is here: https://secwiki.org/w/Nmap/Lua_5.2.
Don't just choose the first interface from the list if no argument was
given; abort the script. See the prerule of url-snarf for an example.

Since the effect, at least on Windows 7, appears to be persistent, do
you think the script should have a default time limit? It wouldn't be
the first script that runs forever, but I think people are still
surprised when a script does that.

David Fifield

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: