---------- Forwarded message ----------
From: Shrey Sharma <[email protected]>
Date: Wed, Apr 6, 2011 at 9:52 PM
Subject: Re: [umit-devel] Regarding GSoc project- Packet Manipulator
To: "Luis A. Bastiao Silva" <[email protected]>
Cc: [email protected]


Hey I have a query!...
        In the project "Project Manipulator" How many new plug-ins do we
need to suggest?
        Do we need to make a plug-in exploiting one protocol at a time?
        Or do we have to make one plug-in for some attack exploiting more
than one protocol at a time?

Please let me know As soon as possible
-Shrey Sharma


On Wed, Apr 6, 2011 at 3:17 PM, Shrey Sharma <[email protected]>wrote:

> Hey,
>         This is regarding the project Packet Manipulator.It is said
> "Interesting audits plugins could target/Routing (and related) protocols
> such as:
>
>    - VLAN truncking protocol (VTP) "
>
>
>   But VTP operates in one of three modes:
>
>    - *Server* – In this VTP mode you can create, remove, and modify VLANs.
>    You can also set other configuration options like the VTP version and also
>    turn on/off VTP pruning for the entire VTP domain. VTP servers advertise
>    their VLAN configuration to other switches in the same VTP domain and
>    synchronize their VLAN configuration with other switches based on messages
>    received over trunk links. VTP server is the default mode. The VLANs
>    information are stored on NVRAM and they are not lost after a reboot.
>    - *Client* – VTP clients behave the same way as VTP servers, but you
>    cannot create, change, or delete VLANs on the local device. Remember that
>    even in VTP client mode, a switch will store the last known VTP
>    information—including the configuration revision number. Don’t assume that 
> a
>    VTP client will start with a clean slate when it powers up.
>    - *Transparent* – When you set the VTP mode to transparent, then the
>    switches do not participate in VTP. A VTP transparent switch will not
>    advertise its VLAN configuration and does not synchronize its VLAN
>    configuration based on received messages. VLANS can be created, changed or
>    deleted when in transparent mode. In VTP version 2, transparent switches do
>    forward VTP messages that they receive out of their trunk ports.
>
>
> So, which mode are we talking about.? What exactly do we have to do by
> making a plug-in?Can you please explain elaborately so that I can plan for
> the implementation of this plug-in?
>
> Thanks,
> Shrey Sharma
> On Mon, Apr 4, 2011 at 4:43 AM, Luis A. Bastiao Silva 
> <[email protected]>wrote:
>
>> Hi,
>>
>> I think some of them could work fine, as plugins. But go ahead with the
>> new audits.
>>
>> I think you expose a plan to integrate tools like that in your proposal.
>>
>> On Sun, Apr 3, 2011 at 9:36 PM, Shrey Sharma <[email protected]>wrote:
>>
>>> Hey,
>>>        As it is mentioned in your "11.Packet-Manipulator" project it is
>>> mentioned that "it should be nice to have interaction with other
>>> security tools".
>>>        I have some of them in mind which I am posting below:
>>>
>>>  1.Hping:*hping* is a free packet 
>>> generator<http://en.wikipedia.org/wiki/Packet_generator> and
>>> analyzer for the TCP/IP <http://en.wikipedia.org/wiki/TCP/IP> protocol
>>> distributed by Salvatore Sanfilippo (also known as *Antirez*). Hping is
>>> one of the *de facto* tools for security auditing and testing of
>>> firewalls and networks, and was used to exploit the idle 
>>> scan<http://en.wikipedia.org/wiki/Idle_scan> scanning
>>> technique (also invented by the hping author), and now implemented in the 
>>> Nmap
>>> Security Scanner <http://en.wikipedia.org/wiki/Nmap>. The new version of
>>> hping, hping3, is scriptable using the 
>>> Tcl<http://en.wikipedia.org/wiki/Tcl> language
>>> and implements an engine for string based, human readable description of
>>> TCP/IP <http://en.wikipedia.org/wiki/TCP/IP> packets, so that the
>>> programmer can write scripts related to low level 
>>> TCP/IP<http://en.wikipedia.org/wiki/TCP/IP> packet
>>> manipulation and analysis in very short time.
>>>
>>> 2.Ostinato:
>>>
>>>
>>>    - Support for the most common standard protocols
>>>       - Ethernet/802.3/LLC SNAP
>>>       - VLAN (with QinQ)
>>>       - ARP, IPv4, IPv6, IP-in-IP a.k.a IP Tunnelling (6over4, 4over6,
>>>       4over4, 6over6)
>>>       - TCP, UDP, ICMPv4, ICMPv6, IGMP, MLD
>>>       - Any text based protocol (HTTP, SIP, RTSP, NNTP etc.)
>>>       - More protocols in the works ...
>>>    - Modify any field of any protocol (some protocols allow changing
>>>    packet fields with every packet at run time e.g. changing IP/MAC 
>>> addresses)
>>>    - User provided Hex Dump - specify some or all bytes in a packet
>>>    - User defined script to substitute for an unimplemented protocol
>>>    (EXPERIMENTAL)
>>>    - Stack protocols in any arbitrary order
>>>    - Create and configure multiple streams
>>>    - Configure stream rates, bursts, no. of packets
>>>    - Single client can control and configure multiple ports on multiple
>>>    computers generating traffic
>>>    - Exclusive control of a port to prevent the OS from sending stray
>>>    packets provides a controlled testing environment
>>>    - Statistics Window shows realtime port receive/transmit statistics
>>>    and rates
>>>    - Capture packets and view them (needs Wireshark to view the captured
>>>    packets)
>>>
>>>
>>> 3.Yersinia
>>>
>>> *Yersinia* - is a network 
>>> security/hacking<http://en.wikipedia.org/wiki/Hacker_(computer_security)> 
>>> tool
>>> for Unix <http://en.wikipedia.org/wiki/Unix>-like operating systems,
>>> designed to take advantage of some weakness in different network protocols.
>>> Yersinia is considered a valuable and widely used security tools. As of 2008
>>> Yersinia is still under development with a latest stable version number
>>> 0.7.1.
>>>
>>> Attacks for the following network protocols are implemented:
>>>
>>>    - Spanning Tree 
>>> Protocol<http://en.wikipedia.org/wiki/Spanning_Tree_Protocol>
>>>     (STP)
>>>    - Cisco Discovery 
>>> Protocol<http://en.wikipedia.org/wiki/Cisco_Discovery_Protocol>
>>>     (CDP)
>>>    - Dynamic Trunking 
>>> Protocol<http://en.wikipedia.org/wiki/Dynamic_Trunking_Protocol>
>>>     (DTP)
>>>    - Dynamic Host Configuration 
>>> Protocol<http://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol>
>>>     (DHCP)
>>>    - Hot Standby Router 
>>> Protocol<http://en.wikipedia.org/wiki/Hot_Standby_Router_Protocol>
>>>     (HSRP)
>>>    - IEEE 802.1Q <http://en.wikipedia.org/wiki/IEEE_802.1Q>
>>>    - IEEE 802.1X <http://en.wikipedia.org/wiki/IEEE_802.1X>
>>>    - Cisco Inter-Switch 
>>> Link<http://en.wikipedia.org/wiki/Cisco_Inter-Switch_Link>
>>>     (ISL)
>>>    - VLAN Trunking 
>>> Protocol<http://en.wikipedia.org/wiki/VLAN_Trunking_Protocol>
>>>     (VTP)
>>>
>>>
>>> ******These even include some of the protocols we are trying to implement
>>> in the project*********
>>> Please notify me if any of them is useful in context of the project
>>> "Packet Manipulator "
>>>
>>> Thnx....
>>>
>>> -Shrey
>>>
>>>
>>>    - On Mon, Apr 4, 2011 at 12:25 AM, Shrey Sharma <
>>>    [email protected]> wrote:
>>>
>>> And I have one more question....
>>>> In the project named Packet Manipulator-new audit
>>>> what does "change the protocols behavior based on MITM audits" means
>>>> ...I mean do we have to work to prevent such attacks ??
>>>>
>>>> -Shrey
>>>>
>>>> On Mon, Apr 4, 2011 at 12:21 AM, Shrey Sharma <[email protected]
>>>> > wrote:
>>>>
>>>>> Hey i was jst experimenting with my Nmap and i found that it doesn’t
>>>>> identify the windows platform precisely ...i.e. it says that it could be
>>>>> windows 7,windows vista, windows 2000..
>>>>>
>>>>> but it doesn’t identify that exactly which version is being used.So , I
>>>>> have come up with an idea, Please read it and tell me if it can work..
>>>>>
>>>>>
>>>>> “Less tactful attempts at OS identification can be made by
>>>>>
>>>>> launching known exploits for a given OS type against a target host, in
>>>>>
>>>>> chronological order. The theory is that exploits are patched as they
>>>>> are
>>>>>
>>>>> discovered so by starting with the oldest known exploit against a given
>>>>> host
>>>>>
>>>>> and working forward should yield a point at which an attack succeeds,
>>>>> which
>>>>>
>>>>> should thereby identify the revision of OS in use. As an example,
>>>>> Microsoft
>>>>>
>>>>> Windows 95, 98 and NT4 are difficult to distinguish supposedly because
>>>>> the
>>>>>
>>>>> IP stack code was only marginally revised between OS versions. Starting
>>>>>
>>>>> with a basic WinNuke attack and moving forward to more complex attacks
>>>>> such as Teardrop can eventually yield a vulnerability that points to the
>>>>> type and/or hotfix revision that is missing from the OS, thus indicating 
>>>>> the
>>>>> current patch level”
>>>>>
>>>>> Waiting Eagerly,
>>>>> -Shrey
>>>>>
>>>>> On Sat, Apr 2, 2011 at 5:40 PM, Luis A. Bastiao Silva <
>>>>> [email protected]> wrote:
>>>>>
>>>>>> Ah, now I notice, did you need any help to start running Audit
>>>>>> Framework?
>>>>>>
>>>>>>
>>>>>> On Fri, Apr 1, 2011 at 5:24 PM, Luis A. Bastiao Silva <
>>>>>> [email protected]> wrote:
>>>>>>
>>>>>>> Shrey,
>>>>>>>
>>>>>>> You should start by doing a proposal.
>>>>>>>
>>>>>>> Start filling the template:
>>>>>>>
>>>>>>> http://www.google-melange.com/gsoc/org/home/google/gsoc2011/umit
>>>>>>>
>>>>>>> Then, submit, and you can edit on the fly. I can paste a few
>>>>>>> comments. Start by filling it.
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> On Fri, Apr 1, 2011 at 4:52 PM, Shrey Sharma <
>>>>>>> [email protected]> wrote:
>>>>>>>
>>>>>>>> Can you please suggest me how can I submit a patch on 11 - Packet
>>>>>>>> Manipulator - new audits ?
>>>>>>>> *and how can I improve my chances to get selected for this project.
>>>>>>>> *
>>>>>>>>
>>>>>>>> On Fri, Apr 1, 2011 at 9:03 PM, Luis A. Bastiao Silva <
>>>>>>>> [email protected]> wrote:
>>>>>>>>
>>>>>>>>> Hi Shrey,
>>>>>>>>>
>>>>>>>>> On Fri, Apr 1, 2011 at 3:55 PM, Shrey Sharma <
>>>>>>>>> [email protected]> wrote:
>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>            Hi,
>>>>>>>>>>                  My name is Shrey Sharma.I am really very excited
>>>>>>>>>> about *P**acket Manipulator .*
>>>>>>>>>> *                 *I am a B.tech Student of Indian Institute of
>>>>>>>>>> Technology(IIT),Kharagpur majoring in Computer Science.
>>>>>>>>>>                  I have a huge interest in the field of networks.
>>>>>>>>>> I have also volunteered as the system administrator  in my Computer 
>>>>>>>>>> Science
>>>>>>>>>> Department .
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Thanks for introduction. It has a great value for us, because we
>>>>>>>>> are an open souce organization focused on network security, audit,
>>>>>>>>> monitoring .. :)
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>           Skills:
>>>>>>>>>>               I know Python,but didn't do any major project in it.
>>>>>>>>>>               I am currently learning about the network protocols.
>>>>>>>>>>               Recently, attended a workshop on Hacking and Digital
>>>>>>>>>> Securities organized by Kyrion Digital 
>>>>>>>>>> Securities<http://www.kyrion.in/>
>>>>>>>>>>
>>>>>>>>>>            It would be really great if you could suggest me any
>>>>>>>>>> work that I can do to increase my chances to work in this project.
>>>>>>>>>>            I have gone through all the links but it would be great
>>>>>>>>>> if you can send further details of this project.
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Related ideas:
>>>>>>>>> http://www.umitproject.org/?active=gsoc&mode=ideas#6
>>>>>>>>> http://www.umitproject.org/?active=gsoc&mode=ideas#7
>>>>>>>>> http://www.umitproject.org/?active=gsoc&mode=ideas#11
>>>>>>>>>
>>>>>>>>> You can also propose your own idea to improve PacketManipulator.
>>>>>>>>>
>>>>>>>>> Information about Packet Manipulator:
>>>>>>>>> http://trac.umitproject.org/wiki/PacketManipulator
>>>>>>>>>
>>>>>>>>> Information about Audit Framework (PacketManipulator framework)
>>>>>>>>> http://trac.umitproject.org/wiki/AuditFramework
>>>>>>>>>
>>>>>>>>> Submit your proposal:
>>>>>>>>> http://www.google-melange.com/gsoc/org/google/gsoc2011/umit
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Just let us know if you need further information.
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>> Eagerly Waiting for your reply,
>>>>>>>>>> Shrey Sharma
>>>>>>>>>> Department of Computer Science
>>>>>>>>>> IIT Kharagpur
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> ------------------------------------------------------------------------------
>>>>>>>>>> Create and publish websites with WebMatrix
>>>>>>>>>> Use the most popular FREE web apps or write code yourself;
>>>>>>>>>> WebMatrix provides all the features you need to develop and
>>>>>>>>>> publish your website. http://p.sf.net/sfu/ms-webmatrix-sf
>>>>>>>>>>
>>>>>>>>>> _______________________________________________
>>>>>>>>>> Umit-devel mailing list
>>>>>>>>>> [email protected]
>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/umit-devel
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Best Regards,
>>>>>>>>> --
>>>>>>>>> Luís A. Bastião Silva
>>>>>>>>> Skype: koplabs
>>>>>>>>> http://www.bastiao.org
>>>>>>>>>
>>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> --
>>>>>>> Luís A. Bastião Silva
>>>>>>> Skype: koplabs
>>>>>>> http://www.bastiao.org
>>>>>>>
>>>>>>>
>>>>>>
>>>>>>
>>>>>> --
>>>>>> Luís A. Bastião Silva
>>>>>> Skype: koplabs
>>>>>> http://www.bastiao.org
>>>>>>
>>>>>>
>>>>>
>>>>
>>>
>> If you have any doubts, just let us know.
>>
>>
>> Best Regards,
>> --
>> Luís A. Bastião Silva
>> Skype: koplabs
>> http://www.bastiao.org
>>
>>
>
------------------------------------------------------------------------------
Xperia(TM) PLAY
It's a major breakthrough. An authentic gaming
smartphone on the nation's most reliable network.
And it wants your games.
http://p.sf.net/sfu/verizon-sfdev
_______________________________________________
Umit-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/umit-devel

Reply via email to