Nmap Development mailing list archives
Re: Vulnerability and Exploitation Specialist
From: Muhammad Junaid Muzammil <mjunaidmuzammil () gmail com>
Date: Wed, 3 Apr 2013 19:43:47 +0500
Hi, I was getting familiar with the nmap scripting engine and was reading articles pertaining to nmap. In one of the articles, wikipedia has raised some legality and ethical issues as nmap has been used for hacking. http://en.m.wikipedia.org/wiki/Nmap#section_7 How does nmap address these issues? Regards, Junaid On Apr 3, 2013 1:22 PM, "Fyodor" <fyodor () nmap org> wrote:
On Thu, Mar 28, 2013 at 12:07 PM, Muhammad Junaid Muzammil < mjunaidmuzammil () gmail com> wrote:I was looking through the gsoc 2013 project list and I am pretty much interested for the post of Vulnerability and Exploitation Specialist. I do have some queries here.Hi Junaid. I'm glad to hear that you're considering Nmap SoC. First, please not that we aren't really finished updating our SoC ideas page from last year. But we have applied to Google to participate again this year. And you can find more of our 2013 ideas and plans in a rougher form at these links: https://secwiki.org/w/GSoC_community_ideas http://seclists.org/nmap-dev/2013/q1/394 I also hope to update our main SoC page soon (http://nmap.org/soc/) Meanwhile, regarding your specific questions: 1) How the resources are arranged? For example some vulnerabilities aremeant for MAC machines, SUN machines. Does nmap provides on-line access to these resources or the student should target the vulnerabilities whose resources are available to them.Yes, there are far more potential vuln scripts than we could ever actually write during a summer, so we need to prioritize based on things like severity of the bug, how hard the script will be to write, ease of access to the service for testing, etc. 2) What are the research prospects after the soc program completes. Doesnmap allow the work done for them to be continued further as University research?Yes, that is allowed and encouraged. Cheers, Fyodor
_______________________________________________ Sent through the dev mailing list http://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Re: Vulnerability and Exploitation Specialist Fyodor (Apr 03)
- Re: Vulnerability and Exploitation Specialist Muhammad Junaid Muzammil (Apr 03)