Nmap Development mailing list archives
Re: DNS fuzzer
From: Michael Pattrick <mpattrick () rhinovirus org>
Date: Fri, 2 Apr 2010 22:29:25 -0400
On Mon, Mar 29, 2010 at 1:11 PM, David Fifield
I'd like to include this script if it can be made not to run forever, instead running some fixed number of rounds (controlled by a script argument). I would like to see other fuzzing techniques too, though of course those can be added incrementally. I'm thinking something like 100 rounds each of: * Randomly swap bits (like you have now). * Randomly drop bytes. * Randomly duplicate bytes. * Randomly swap bytes. * Truncate packets at a random location.
I've added three new modes (add byte, drop byte, and truncate) and have decided to randomize when each is used. -M
Attachment:
dns-fuzz.nse
Description:
_______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://seclists.org/nmap-dev/
Current thread:
- parse_timespec function, (continued)
- parse_timespec function David Fifield (Apr 05)
- Re: parse_timespec function Michael Pattrick (Apr 06)
- Re: parse_timespec function Fyodor (Apr 07)
- Re: parse_timespec function David Fifield (Apr 08)
- Re: parse_timespec function Fyodor (Apr 08)
- Re: parse_timespec function David Fifield (Apr 15)
- Re: parse_timespec function David Fifield (Apr 13)
- Re: DNS fuzzer Michael Pattrick (Apr 03)
- Re: DNS fuzzer' David Fifield (Apr 03)
- Re: DNS fuzzer David Fifield (Apr 02)
