mailing list archives
Fwd: Exfiltrated NSE script
From: Jacek Wielemborek <wielemborekj1 () gmail com>
Date: Thu, 29 Aug 2013 12:20:06 +0200
While browsing the (not maintained anymore) h-online.com website, I
once encountered this news:
While browsing the data available here, I noticed I could easily run a
scan on my university address range and get results immediately,
without sending to it a packet from any source address. The obvious
catch here is that the Internet Census 2012 data aren't exactly most
up to date, but I believe that they still could be useful. Especially
that we got a permission from the exfiltrated.com site administrator,
so we don't have to store the data anywhere.
I have to admit I have no idea about the legal point of view of using
that data, so it's one of the things I'd like to hear about from you.
From my point of view, it's not us that grabbed data and we'd
basically write a script to just grab it from a website, so perhaps
it's all okay?
The way I see the script, there are three use cases I can think of.
One would involve skipping the SYN scan altogether and using
exfiltrated data to fill out the port status, setting the "reason"
field to "exfiltrated.com". We could also add the ports to the to-scan
list to include them even if they're not in the default top 1000. The
last option is to compare our scan results to the historical data from
IC2K12 results. What do you think about it?
Below is the original e-mail from Wesley, along with my e-mail to him
as well. I CC'ed this message to him too.
---------- Forwarded message ----------
From: Wesley <wesley () exfiltrated com>
Subject: Re: Exfiltrated NSE script
To: Jacek Wielemborek <wielemborekj1 () gmail com>
DW: Wesley W <wesley () exfiltrated com>
I would not mind at all if you would like to make a NSE script to
query my website! Currently my web host is terrible, and I've had
delays in moving it to a better hosting provider. I do hope to have
my hosting situation sorted out soon, so the traffic situation should
not be an issue. Ideally I would just get you to add something like
"?source=NSE" to each request so that if traffic was overwhelming the
server I could easily filter it out and provide some sort of helpful
error message to people. Currently the SYN results are the least
intensive to query from the server, and the DNS are the most
intensive, so that works in our favour too.
Let me know if you need any help along the way, and thanks for
checking with me first!
On Mon, Aug 26, 2013 at 10:03 AM, Jacek Wielemborek
<wielemborekj1 () gmail com> wrote:
Would you mind if I wrote (or inspired my friend to write) an Nmap NSE
script that would have a look at exfiltrated.com for SYN scan results
and display them? I could probably make it nondefault if you're
worried about too much traffic.
Sent through the dev mailing list
Archived at http://seclists.org/nmap-dev/
- Fwd: Exfiltrated NSE script Jacek Wielemborek (Aug 29)