Nmap Development mailing list archives
Re: Vulnerability and Exploitation Specialist
From: Fyodor <fyodor () nmap org>
Date: Wed, 3 Apr 2013 01:22:08 -0700
On Thu, Mar 28, 2013 at 12:07 PM, Muhammad Junaid Muzammil < mjunaidmuzammil () gmail com> wrote:
I was looking through the gsoc 2013 project list and I am pretty much interested for the post of Vulnerability and Exploitation Specialist. I do have some queries here.
Hi Junaid. I'm glad to hear that you're considering Nmap SoC. First, please not that we aren't really finished updating our SoC ideas page from last year. But we have applied to Google to participate again this year. And you can find more of our 2013 ideas and plans in a rougher form at these links: https://secwiki.org/w/GSoC_community_ideas http://seclists.org/nmap-dev/2013/q1/394 I also hope to update our main SoC page soon (http://nmap.org/soc/) Meanwhile, regarding your specific questions: 1) How the resources are arranged? For example some vulnerabilities are
meant for MAC machines, SUN machines. Does nmap provides on-line access to these resources or the student should target the vulnerabilities whose resources are available to them.
Yes, there are far more potential vuln scripts than we could ever actually write during a summer, so we need to prioritize based on things like severity of the bug, how hard the script will be to write, ease of access to the service for testing, etc. 2) What are the research prospects after the soc program completes. Does
nmap allow the work done for them to be continued further as University research?
Yes, that is allowed and encouraged. Cheers, Fyodor _______________________________________________ Sent through the dev mailing list http://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Re: Vulnerability and Exploitation Specialist Fyodor (Apr 03)
- Re: Vulnerability and Exploitation Specialist Muhammad Junaid Muzammil (Apr 03)