
Nmap Development mailing list archives
Sriharsha Karamchati's Status Report #4 of 13
From: Sriharsha Karamchati <leo.harsha93 () gmail com>
Date: Tue, 17 Jun 2014 11:56:31 +0530
This is my status report *#4 of 13* *Accomplishments* - Written a python script which tests the given dns-ip6-arpa-scan.nse script against the namesevers of the list of ipv6 enabled websites given as input to the python script. - You can find the README, code, Input and a sample output files here : https://svn.nmap.org/nmap-exp/Sriharsha/dns-ip6-arpa-scan/ P.S : Your feedback would be very helpful. For now, myself and Fyodor (mentor) have decided to proceed with the improvements to the script since the result shows that many nameservers are vulnerable to the issue adn good number of DNS servers support this technique. - Going through the dns-ip6-arpa-scan.nse code. *Priorities :* 1. Implement these improvements to dns-ip6-arpa-scan.nse script - Another minor detail is that it would be nice if it printed the number of hosts discovered. This could go in the "dns-ip6-arpa-scan:" line which is otherwise empty anyway. - Instead of separate "prefix" and "mask" arguments, maybe it could support them together like Nmap generally does for IPv4. Examples could be "2600:3c01::f03c:91ff:fe93:cd19/112", "scanme.nmap.org/112 <http://www.google.com/url?q=http%3A%2F%2Fscanme.nmap.org%2F112&sa=D&sntz=1&usg=AFQjCNEupcozQ3sjt6fi48y0KEr4nz5J4w>", or "2600:3c01/32". Besides being an easier syntax to use, this would allow the script to accept multiple prefixes/masks. 2. IPv6 scripts were not working on my windows system. Will try to resolve it. Cheers! Sriharsha _______________________________________________ Sent through the dev mailing list http://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Sriharsha Karamchati's Status Report #4 of 13 Sriharsha Karamchati (Jun 16)