Nmap Development mailing list archives

Re: Nmap/Google SoC 2007 Ideas?


From: "Eddie Bell" <ejlbell () gmail com>
Date: Fri, 16 Mar 2007 11:06:34 +0000

I was mulling over an idea about a --interactive overhaul.

Perhaps something with a metasploit-esq interface (command line
editing/history/tab completion)  where the user can browse NSE
packages, view descriptions and set script arguments (optional and
mandatory). At the moment specifying NSE scripts and their arguments
on the command line is a little awkward.  A few other ideas for the
console include;

 * setting nmap options
 * NSE update from a central repository
 * XML log management (searching/consolidating etc..) maybe with a
custom query language?

It could even be plugin based.

- eddie


On 16/03/07, Fyodor <fyodor () insecure org> wrote:
Google just notified me today that the Nmap project has been accepted
to participate in their 2007 SoC program!  The first two years of the
program were a great success, and I'm delighted to participate again
this year.  The first step, which I would like to complete by Monday
(19th) is thinking up some great ideas for the students to pursue.
You can see last years' idea page here:

http://insecure.org/nmap/GoogleGrants.html

Diman Todorov (who architected the NSE system last summer) will
probably be mentoring a SoC student this summer to work on scripts
and/or NSE infrastructure.  Similarly, Adriano Monteiro, who pioneered
the UMIT Nmap graphical interface as a SoC student in '05 and '06 has
been accepted by Google to mentor UMIT students as a standalone
project for this summer!

If you have any cool ideas for Nmap, please post them to the list!
This is a great chance to think about what you would really like Nmap
to do for you, and then to have it happen without you having to write
the code yourself!

Cheers,
Fyodor

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: