Nmap Development mailing list archives

Sriharsha Karamchati's Status Report #4 of 13


From: Sriharsha Karamchati <leo.harsha93 () gmail com>
Date: Tue, 17 Jun 2014 11:56:31 +0530

This is my status report *#4 of 13*


*Accomplishments*



   - Written a python script which tests the given dns-ip6-arpa-scan.nse
   script against the namesevers of the list of ipv6 enabled websites given as
   input to the python script.
   - You can find the README, code, Input and a sample output files here :
   https://svn.nmap.org/nmap-exp/Sriharsha/dns-ip6-arpa-scan/
   P.S : Your feedback would be very helpful. For now, myself and Fyodor
   (mentor) have decided to proceed with the improvements to the script since
   the result shows that many nameservers are vulnerable to the issue adn good
   number of DNS servers support this technique.
   - Going through the dns-ip6-arpa-scan.nse code.


*Priorities :*



   1. Implement these improvements to dns-ip6-arpa-scan.nse script
   - Another minor detail is that it would be nice if it printed the
      number of hosts discovered. This could go in the "dns-ip6-arpa-scan:"
      line which is otherwise empty anyway.
      - Instead of separate "prefix" and "mask" arguments, maybe it could
      support them together like Nmap generally does for IPv4.
Examples could be
      "2600:3c01::f03c:91ff:fe93:cd19/112",
      "scanme.nmap.org/112
      
<http://www.google.com/url?q=http%3A%2F%2Fscanme.nmap.org%2F112&sa=D&sntz=1&usg=AFQjCNEupcozQ3sjt6fi48y0KEr4nz5J4w>",
      or "2600:3c01/32". Besides being an easier syntax to use, this
would allow
      the script to accept multiple prefixes/masks.
      2. IPv6 scripts were not working on my windows system. Will try to
   resolve it.


 Cheers!
 Sriharsha
_______________________________________________
Sent through the dev mailing list
http://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/


Current thread: