Nmap Development mailing list archives

Re: DNS fuzzer


From: Michael Pattrick <mpattrick () rhinovirus org>
Date: Sat, 27 Mar 2010 12:02:27 -0400

On Sat, Mar 27, 2010 at 11:27 AM, Patrik Karlsson <patrik () cqure net> wrote:
On 27 mar 2010, at 15.24, Ron wrote:

On Sat, 27 Mar 2010 03:19:02 -0400 Michael Pattrick
<mpattrick () rhinovirus org> wrote:
And just to clarify, I don't think this script should be included by
default with Nmap. Instead I'm leaving it on the mailing list to be
discovered by anyone who needs it.
I think there's some value to having a category of scripts called 'fuzzer'. I don't think they should run unless 
specifically requested, though.

--
Ron Bowes
http://www.skullsecurity.org
http://www.twitter.com/iagox86
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


While on this subject I think it would be useful to introduce a category for database scripts.
What is the criteria for introducing new categories?

Hey Patrik,

Categories are more for what a script does, as opposed to what type of
server it interacts with. Would these database scrips fall into the
'exploit' or 'vuln' categories? What type of scripts do you have in
mind?

Maybe we could move this to another thread because: Nmap could use
some more database scripts, and SoC is coming up.

-M
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: