Please view my proposal on Packet Manipulator on
https://docs.google.com/viewer?a=v&pid=explorer&chrome=true&srcid=0B0zrpJ27iKqbMTU2OTVhODUtOGQ1OS00ZTczLTkwODctZjY0YjcxOGUzY2E0&hl=en
and on
http://www.google-melange.com/gsoc/proposal/review/google/gsoc2011/shreysharma/1
Hoping for the best,
Shrey
On Wed, Apr 6, 2011 at 9:53 PM, Shrey Sharma <[email protected]>wrote:
>
>
> ---------- Forwarded message ----------
> From: Shrey Sharma <[email protected]>
> Date: Wed, Apr 6, 2011 at 9:52 PM
> Subject: Re: [umit-devel] Regarding GSoc project- Packet Manipulator
> To: "Luis A. Bastiao Silva" <[email protected]>
> Cc: [email protected]
>
>
> Hey I have a query!...
> In the project "Project Manipulator" How many new plug-ins do we
> need to suggest?
> Do we need to make a plug-in exploiting one protocol at a time?
> Or do we have to make one plug-in for some attack exploiting more
> than one protocol at a time?
>
> Please let me know As soon as possible
> -Shrey Sharma
>
>
> On Wed, Apr 6, 2011 at 3:17 PM, Shrey Sharma <[email protected]>wrote:
>
>> Hey,
>> This is regarding the project Packet Manipulator.It is said
>> "Interesting audits plugins could target/Routing (and related) protocols
>> such as:
>>
>> - VLAN truncking protocol (VTP) "
>>
>>
>> But VTP operates in one of three modes:
>>
>> - *Server* – In this VTP mode you can create, remove, and modify
>> VLANs. You can also set other configuration options like the VTP version
>> and
>> also turn on/off VTP pruning for the entire VTP domain. VTP servers
>> advertise their VLAN configuration to other switches in the same VTP
>> domain
>> and synchronize their VLAN configuration with other switches based on
>> messages received over trunk links. VTP server is the default mode. The
>> VLANs information are stored on NVRAM and they are not lost after a
>> reboot.
>> - *Client* – VTP clients behave the same way as VTP servers, but you
>> cannot create, change, or delete VLANs on the local device. Remember that
>> even in VTP client mode, a switch will store the last known VTP
>> information—including the configuration revision number. Don’t assume
>> that a
>> VTP client will start with a clean slate when it powers up.
>> - *Transparent* – When you set the VTP mode to transparent, then the
>> switches do not participate in VTP. A VTP transparent switch will not
>> advertise its VLAN configuration and does not synchronize its VLAN
>> configuration based on received messages. VLANS can be created, changed or
>> deleted when in transparent mode. In VTP version 2, transparent switches
>> do
>> forward VTP messages that they receive out of their trunk ports.
>>
>>
>> So, which mode are we talking about.? What exactly do we have to do by
>> making a plug-in?Can you please explain elaborately so that I can plan for
>> the implementation of this plug-in?
>>
>> Thanks,
>> Shrey Sharma
>> On Mon, Apr 4, 2011 at 4:43 AM, Luis A. Bastiao Silva <[email protected]
>> > wrote:
>>
>>> Hi,
>>>
>>> I think some of them could work fine, as plugins. But go ahead with the
>>> new audits.
>>>
>>> I think you expose a plan to integrate tools like that in your proposal.
>>>
>>> On Sun, Apr 3, 2011 at 9:36 PM, Shrey Sharma
>>> <[email protected]>wrote:
>>>
>>>> Hey,
>>>> As it is mentioned in your "11.Packet-Manipulator" project it is
>>>> mentioned that "it should be nice to have interaction with other
>>>> security tools".
>>>> I have some of them in mind which I am posting below:
>>>>
>>>> 1.Hping:*hping* is a free packet
>>>> generator<http://en.wikipedia.org/wiki/Packet_generator> and
>>>> analyzer for the TCP/IP <http://en.wikipedia.org/wiki/TCP/IP> protocol
>>>> distributed by Salvatore Sanfilippo (also known as *Antirez*). Hping is
>>>> one of the *de facto* tools for security auditing and testing of
>>>> firewalls and networks, and was used to exploit the idle
>>>> scan<http://en.wikipedia.org/wiki/Idle_scan> scanning
>>>> technique (also invented by the hping author), and now implemented in the
>>>> Nmap
>>>> Security Scanner <http://en.wikipedia.org/wiki/Nmap>. The new version
>>>> of hping, hping3, is scriptable using the
>>>> Tcl<http://en.wikipedia.org/wiki/Tcl> language
>>>> and implements an engine for string based, human readable description of
>>>> TCP/IP <http://en.wikipedia.org/wiki/TCP/IP> packets, so that the
>>>> programmer can write scripts related to low level
>>>> TCP/IP<http://en.wikipedia.org/wiki/TCP/IP> packet
>>>> manipulation and analysis in very short time.
>>>>
>>>> 2.Ostinato:
>>>>
>>>>
>>>> - Support for the most common standard protocols
>>>> - Ethernet/802.3/LLC SNAP
>>>> - VLAN (with QinQ)
>>>> - ARP, IPv4, IPv6, IP-in-IP a.k.a IP Tunnelling (6over4, 4over6,
>>>> 4over4, 6over6)
>>>> - TCP, UDP, ICMPv4, ICMPv6, IGMP, MLD
>>>> - Any text based protocol (HTTP, SIP, RTSP, NNTP etc.)
>>>> - More protocols in the works ...
>>>> - Modify any field of any protocol (some protocols allow changing
>>>> packet fields with every packet at run time e.g. changing IP/MAC
>>>> addresses)
>>>> - User provided Hex Dump - specify some or all bytes in a packet
>>>> - User defined script to substitute for an unimplemented protocol
>>>> (EXPERIMENTAL)
>>>> - Stack protocols in any arbitrary order
>>>> - Create and configure multiple streams
>>>> - Configure stream rates, bursts, no. of packets
>>>> - Single client can control and configure multiple ports on multiple
>>>> computers generating traffic
>>>> - Exclusive control of a port to prevent the OS from sending stray
>>>> packets provides a controlled testing environment
>>>> - Statistics Window shows realtime port receive/transmit statistics
>>>> and rates
>>>> - Capture packets and view them (needs Wireshark to view the
>>>> captured packets)
>>>>
>>>>
>>>> 3.Yersinia
>>>>
>>>> *Yersinia* - is a network
>>>> security/hacking<http://en.wikipedia.org/wiki/Hacker_(computer_security)>
>>>> tool
>>>> for Unix <http://en.wikipedia.org/wiki/Unix>-like operating systems,
>>>> designed to take advantage of some weakness in different network protocols.
>>>> Yersinia is considered a valuable and widely used security tools. As of
>>>> 2008
>>>> Yersinia is still under development with a latest stable version number
>>>> 0.7.1.
>>>>
>>>> Attacks for the following network protocols are implemented:
>>>>
>>>> - Spanning Tree
>>>> Protocol<http://en.wikipedia.org/wiki/Spanning_Tree_Protocol>
>>>> (STP)
>>>> - Cisco Discovery
>>>> Protocol<http://en.wikipedia.org/wiki/Cisco_Discovery_Protocol>
>>>> (CDP)
>>>> - Dynamic Trunking
>>>> Protocol<http://en.wikipedia.org/wiki/Dynamic_Trunking_Protocol>
>>>> (DTP)
>>>> - Dynamic Host Configuration
>>>> Protocol<http://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol>
>>>> (DHCP)
>>>> - Hot Standby Router
>>>> Protocol<http://en.wikipedia.org/wiki/Hot_Standby_Router_Protocol>
>>>> (HSRP)
>>>> - IEEE 802.1Q <http://en.wikipedia.org/wiki/IEEE_802.1Q>
>>>> - IEEE 802.1X <http://en.wikipedia.org/wiki/IEEE_802.1X>
>>>> - Cisco Inter-Switch
>>>> Link<http://en.wikipedia.org/wiki/Cisco_Inter-Switch_Link>
>>>> (ISL)
>>>> - VLAN Trunking
>>>> Protocol<http://en.wikipedia.org/wiki/VLAN_Trunking_Protocol>
>>>> (VTP)
>>>>
>>>>
>>>> ******These even include some of the protocols we are trying to
>>>> implement in the project*********
>>>> Please notify me if any of them is useful in context of the project
>>>> "Packet Manipulator "
>>>>
>>>> Thnx....
>>>>
>>>> -Shrey
>>>>
>>>>
>>>> - On Mon, Apr 4, 2011 at 12:25 AM, Shrey Sharma <
>>>> [email protected]> wrote:
>>>>
>>>> And I have one more question....
>>>>> In the project named Packet Manipulator-new audit
>>>>> what does "change the protocols behavior based on MITM audits" means
>>>>> ...I mean do we have to work to prevent such attacks ??
>>>>>
>>>>> -Shrey
>>>>>
>>>>> On Mon, Apr 4, 2011 at 12:21 AM, Shrey Sharma <
>>>>> [email protected]> wrote:
>>>>>
>>>>>> Hey i was jst experimenting with my Nmap and i found that it doesn’t
>>>>>> identify the windows platform precisely ...i.e. it says that it could be
>>>>>> windows 7,windows vista, windows 2000..
>>>>>>
>>>>>> but it doesn’t identify that exactly which version is being used.So ,
>>>>>> I have come up with an idea, Please read it and tell me if it can work..
>>>>>>
>>>>>>
>>>>>> “Less tactful attempts at OS identification can be made by
>>>>>>
>>>>>> launching known exploits for a given OS type against a target host, in
>>>>>>
>>>>>> chronological order. The theory is that exploits are patched as they
>>>>>> are
>>>>>>
>>>>>> discovered so by starting with the oldest known exploit against a
>>>>>> given host
>>>>>>
>>>>>> and working forward should yield a point at which an attack succeeds,
>>>>>> which
>>>>>>
>>>>>> should thereby identify the revision of OS in use. As an example,
>>>>>> Microsoft
>>>>>>
>>>>>> Windows 95, 98 and NT4 are difficult to distinguish supposedly because
>>>>>> the
>>>>>>
>>>>>> IP stack code was only marginally revised between OS versions.
>>>>>> Starting
>>>>>>
>>>>>> with a basic WinNuke attack and moving forward to more complex attacks
>>>>>> such as Teardrop can eventually yield a vulnerability that points to the
>>>>>> type and/or hotfix revision that is missing from the OS, thus indicating
>>>>>> the
>>>>>> current patch level”
>>>>>>
>>>>>> Waiting Eagerly,
>>>>>> -Shrey
>>>>>>
>>>>>> On Sat, Apr 2, 2011 at 5:40 PM, Luis A. Bastiao Silva <
>>>>>> [email protected]> wrote:
>>>>>>
>>>>>>> Ah, now I notice, did you need any help to start running Audit
>>>>>>> Framework?
>>>>>>>
>>>>>>>
>>>>>>> On Fri, Apr 1, 2011 at 5:24 PM, Luis A. Bastiao Silva <
>>>>>>> [email protected]> wrote:
>>>>>>>
>>>>>>>> Shrey,
>>>>>>>>
>>>>>>>> You should start by doing a proposal.
>>>>>>>>
>>>>>>>> Start filling the template:
>>>>>>>>
>>>>>>>> http://www.google-melange.com/gsoc/org/home/google/gsoc2011/umit
>>>>>>>>
>>>>>>>> Then, submit, and you can edit on the fly. I can paste a few
>>>>>>>> comments. Start by filling it.
>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> On Fri, Apr 1, 2011 at 4:52 PM, Shrey Sharma <
>>>>>>>> [email protected]> wrote:
>>>>>>>>
>>>>>>>>> Can you please suggest me how can I submit a patch on 11 - Packet
>>>>>>>>> Manipulator - new audits ?
>>>>>>>>> *and how can I improve my chances to get selected for this
>>>>>>>>> project.
>>>>>>>>> *
>>>>>>>>>
>>>>>>>>> On Fri, Apr 1, 2011 at 9:03 PM, Luis A. Bastiao Silva <
>>>>>>>>> [email protected]> wrote:
>>>>>>>>>
>>>>>>>>>> Hi Shrey,
>>>>>>>>>>
>>>>>>>>>> On Fri, Apr 1, 2011 at 3:55 PM, Shrey Sharma <
>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> Hi,
>>>>>>>>>>> My name is Shrey Sharma.I am really very excited
>>>>>>>>>>> about *P**acket Manipulator .*
>>>>>>>>>>> * *I am a B.tech Student of Indian Institute of
>>>>>>>>>>> Technology(IIT),Kharagpur majoring in Computer Science.
>>>>>>>>>>> I have a huge interest in the field of networks.
>>>>>>>>>>> I have also volunteered as the system administrator in my Computer
>>>>>>>>>>> Science
>>>>>>>>>>> Department .
>>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> Thanks for introduction. It has a great value for us, because we
>>>>>>>>>> are an open souce organization focused on network security, audit,
>>>>>>>>>> monitoring .. :)
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> Skills:
>>>>>>>>>>> I know Python,but didn't do any major project in
>>>>>>>>>>> it.
>>>>>>>>>>> I am currently learning about the network
>>>>>>>>>>> protocols.
>>>>>>>>>>> Recently, attended a workshop on Hacking and
>>>>>>>>>>> Digital Securities organized by Kyrion Digital
>>>>>>>>>>> Securities<http://www.kyrion.in/>
>>>>>>>>>>>
>>>>>>>>>>> It would be really great if you could suggest me any
>>>>>>>>>>> work that I can do to increase my chances to work in this project.
>>>>>>>>>>> I have gone through all the links but it would be
>>>>>>>>>>> great if you can send further details of this project.
>>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> Related ideas:
>>>>>>>>>> http://www.umitproject.org/?active=gsoc&mode=ideas#6
>>>>>>>>>> http://www.umitproject.org/?active=gsoc&mode=ideas#7
>>>>>>>>>> http://www.umitproject.org/?active=gsoc&mode=ideas#11
>>>>>>>>>>
>>>>>>>>>> You can also propose your own idea to improve PacketManipulator.
>>>>>>>>>>
>>>>>>>>>> Information about Packet Manipulator:
>>>>>>>>>> http://trac.umitproject.org/wiki/PacketManipulator
>>>>>>>>>>
>>>>>>>>>> Information about Audit Framework (PacketManipulator framework)
>>>>>>>>>> http://trac.umitproject.org/wiki/AuditFramework
>>>>>>>>>>
>>>>>>>>>> Submit your proposal:
>>>>>>>>>> http://www.google-melange.com/gsoc/org/google/gsoc2011/umit
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> Just let us know if you need further information.
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>>> Eagerly Waiting for your reply,
>>>>>>>>>>> Shrey Sharma
>>>>>>>>>>> Department of Computer Science
>>>>>>>>>>> IIT Kharagpur
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> ------------------------------------------------------------------------------
>>>>>>>>>>> Create and publish websites with WebMatrix
>>>>>>>>>>> Use the most popular FREE web apps or write code yourself;
>>>>>>>>>>> WebMatrix provides all the features you need to develop and
>>>>>>>>>>> publish your website. http://p.sf.net/sfu/ms-webmatrix-sf
>>>>>>>>>>>
>>>>>>>>>>> _______________________________________________
>>>>>>>>>>> Umit-devel mailing list
>>>>>>>>>>> [email protected]
>>>>>>>>>>> https://lists.sourceforge.net/lists/listinfo/umit-devel
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> Best Regards,
>>>>>>>>>> --
>>>>>>>>>> Luís A. Bastião Silva
>>>>>>>>>> Skype: koplabs
>>>>>>>>>> http://www.bastiao.org
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>
>>>>>>>>
>>>>>>>> --
>>>>>>>> Luís A. Bastião Silva
>>>>>>>> Skype: koplabs
>>>>>>>> http://www.bastiao.org
>>>>>>>>
>>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> --
>>>>>>> Luís A. Bastião Silva
>>>>>>> Skype: koplabs
>>>>>>> http://www.bastiao.org
>>>>>>>
>>>>>>>
>>>>>>
>>>>>
>>>>
>>> If you have any doubts, just let us know.
>>>
>>>
>>> Best Regards,
>>> --
>>> Luís A. Bastião Silva
>>> Skype: koplabs
>>> http://www.bastiao.org
>>>
>>>
>>
>
>
------------------------------------------------------------------------------
Xperia(TM) PLAY
It's a major breakthrough. An authentic gaming
smartphone on the nation's most reliable network.
And it wants your games.
http://p.sf.net/sfu/verizon-sfdev
_______________________________________________
Umit-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/umit-devel