blob: 3eada092489b62317ce761fc99a3c17010b06065 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
|
=====
GSoC 2011 participation: Discovery and miscelaneous script specialist
=====
Work in progress:
* bgpmon-info analyze
* bittorrent-dht-nodes
* lldp - write script proposal
http://en.wikipedia.org/wiki/Link_Layer_Discovery_Protocol
* disjunctive-traceroute analyze feasibility
http://ccr.sigcomm.org/online/?q=node/398
=====
ToDo:
* snmp-brute port to brute framework
There are a couple of default passwords that snmp-brute uses atm which should be
considered even when it's the brute.lua is used
=====
Maybe (the ones with ** aren't on the Script_Ideas Page yet)
* Bonjour / mdns / llmnr etc.
(DNS protocols support) + backscatter into dns scripts where applicable?
* targets-asn
John Bond is working on this. It's called asn-to-prefixes. Perhaps I could
review it, asist so it makes its way to the library faster? On the other hand
there already are a couple of people assisting.
* targets-dhcp
dhcp-discover as a prerule, so it doesn't run by default. But it doesn't run by
default. It's discovery, intrusive, but not default. Maybe just add the prerule
there, and some way of forcibly initiating the prerule (like an argument).
* hnap-info
* hnap-auth-bypass
A nice hnap library would be fitting, that will make these scripts a breeze.
I'd need testing equipment, or some :S implementation.
* vuze-dht-version
* Nbstat.nse -> change to using a broadcast prerule
* SSL renegotiation
* soap.lua
* xmlrpc.lua
=====
Completed:
* broadcast-ping
* nmap lib: get_ttl() and get_payload_info()
* ip-geolocation scripts
* snmp-interfaces patch related to mac-geolocation
* mac-geolocation
* stdnse.lua: in_port_range()
* backorifice-brute
* backorifice-info
=====
|