Nmap Development mailing list archives
Re: Developing a SCADA Plugin on top of NMAP
From: Stephen Hilt <hilt () digitalbond com>
Date: Sat, 7 Mar 2015 11:07:39 -0500
No, however the same methods are used in these scripts to be compliant with the specs of the protocol and parse the information received from the devices. On Mar 7, 2015 4:52 AM, "Gisle Vanem" <gvanem () yahoo no> wrote:
Stephen Hilt wrote: Take a look at our NSEs as a start athttps://github.com/digitalbond/RedpointThe creators of the Stuxnet [1] trojan/virus used a similar technique to scan for Siemens equipment inside Iranian atomic plants. Like you have here: https://github.com/digitalbond/Redpoint#s7-enumeratense So could it be that they (Mossad?) used Nmap in that attack? --gv _______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
_______________________________________________ Sent through the dev mailing list https://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Developing a SCADA Plugin on top of NMAP Vikal Acharya (Mar 06)
- Re: Developing a SCADA Plugin on top of NMAP Stephen Hilt (Mar 06)
- Re: Developing a SCADA Plugin on top of NMAP Gisle Vanem (Mar 07)
- Re: Developing a SCADA Plugin on top of NMAP Stephen Hilt (Mar 07)
- Re: Developing a SCADA Plugin on top of NMAP Gisle Vanem (Mar 07)
- Re: Developing a SCADA Plugin on top of NMAP Stephen Hilt (Mar 06)