mailing list archives
Re: REgarding my proposal for Gsoc 2011
From: aditya <nauty.me04 () gmail com>
Date: Thu, 7 Apr 2011 14:01:10 +0530
OS detection in itself is a project in itself, atleast from my standards
after going through the nmap code and am really looking forward to a chance
to port IPv4 to IPv6 including the features which i thought of including in
my vulnerability scanner.
On Thu, Apr 7, 2011 at 1:30 PM, aditya <nauty.me04 () gmail com> wrote:
I request the mentors to please comment on my idea/proposal so as to know
how should i proceed.Please its very important
On Thu, Apr 7, 2011 at 3:23 AM, aditya <nauty.me04 () gmail com> wrote:
I was actually aiming to achieve OS detection feature in IPv6 protocol,
for that i will have to
1)research out a module to make it a a full proof detection perhaps what i
was planning was to work on the fingerprinting database
as to what makes an OS detection different from the other.
2)I will actually have to start working at the very ground levels , trying
to work on what makes it different between the windows and linux and its
3)Perhaps i was planning to import the national vulnerability database
into the detection like for example ubuntu(linux)
, which has some vulnerabilities which are very specific to that OS only and
not any other.This would be done on real time , even trying to reduce the
time lag which Nmap takes for a normal scanning.
4)Thus i was trying to refine the way Nmap could possibly use its database
as to refine its catch on OS detection feature.
On Thu, Apr 7, 2011 at 2:19 AM, David Fifield <david () bamsoftware com>wrote:
On Wed, Apr 06, 2011 at 01:02:11PM +0530, aditya wrote:
I actually was much interested in OS detection in IPv6 based
systems/networks. What led me to take up this topic was i found that
was using Nmap for multiple scanning the same host, a lot of times i
across that there was a different OS which was detected , and that got
into a very messed up situation as i being a penetration tester was
much dependant on the authenticity of Nmap
Hence i really want to take up this topic and contribute to Nmap and
source community so as to develop a full proof OS detection module for
support which would help a lot of penetration testers.
Please let me know how else i can improve my project, looking forward
You need to provide more information about your project. As it is, you
haven't told us anything to comment on. You need to state your ideas
here, not only on the google-melange site, because many more people can
see them here.
Please double-check the page at http://nmap.org/soc/apply.html and make
sure you've answered all the questions we require of a proposal.
Sent through the nmap-dev mailing list
Archived at http://seclists.org/nmap-dev/