Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Re: REgarding my proposal for Gsoc 2011
From: aditya <nauty.me04 () gmail com>
Date: Thu, 7 Apr 2011 14:01:10 +0530

Sir,

OS detection in itself is a project in itself, atleast from my standards
after going through the nmap code and am really looking forward to a chance
to port IPv4 to IPv6 including the features which i thought of including in
my vulnerability scanner.

On Thu, Apr 7, 2011 at 1:30 PM, aditya <nauty.me04 () gmail com> wrote:

I request the mentors to please comment on my idea/proposal so as to know
how should i proceed.Please its very important

On Thu, Apr 7, 2011 at 3:23 AM, aditya <nauty.me04 () gmail com> wrote:

Sir,

I was actually aiming to achieve OS detection feature in IPv6 protocol,
for that i will have to

1)research out a module to make it a a full proof detection perhaps what i
was planning was to work on the fingerprinting database
as to what makes an OS detection different from the other.

2)I will actually have to start working at the very ground levels , trying
to work on what makes it different between the windows and linux and its
distributions

3)Perhaps i was planning to import the national vulnerability database
into the detection like for example ubuntu(linux)
http://web.nvd.nist.gov/view/vuln/search-results?query=ubuntu&search_type=all&cves=on
, which has some vulnerabilities which are very specific to that OS only and
not any other.This would be done on real time , even trying to reduce the
time lag which Nmap takes for a normal scanning.

4)Thus i was trying to refine the way Nmap could possibly use its database
as to refine its catch on OS detection feature.

Please comment..



On Thu, Apr 7, 2011 at 2:19 AM, David Fifield <david () bamsoftware com>wrote:

On Wed, Apr 06, 2011 at 01:02:11PM +0530, aditya wrote:
Sir/Madam

I actually was much interested in OS detection in IPv6 based
systems/networks. What led me to take up this topic was i found that
when i
was using Nmap for multiple scanning the same host, a lot of times i
came
across that there was a different OS which was detected , and that got
me
into a very messed up situation as i being a penetration tester was
very
much dependant on the authenticity of Nmap

Hence i really want to take up this topic and contribute to Nmap and
open
source community so as to develop a full proof OS detection module for
IPv6
support which would help a lot of penetration testers.

Please let me know how else i can improve my project, looking forward
for
mentors.

You need to provide more information about your project. As it is, you
haven't told us anything to comment on. You need to state your ideas
here, not only on the google-melange site, because many more people can
see them here.

Please double-check the page at http://nmap.org/soc/apply.html and make
sure you've answered all the questions we require of a proposal.

David Fifield




--
Regards
Aditya Balapure




--
Regards
Aditya




-- 
Regards
Aditya Balapure
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]