Hi, I attached a diff that shows my current work. An additional idea: Checking if the user is root is good. Providing a fall-back if he is not, is better.
Actually, there is no need to sniff for ICMP. It is a valid way to solve the problem, but an alternative way is TCP. I would like to use telnet, because with telnet, we would not have to provide payloads for *ix and Windows. Both systems bring the utility (afaik, don't know exactly which Windows versions have it and which ones do not). Either way -- A "telnet ourhost our_temp_port" would force the target host to connect to the tcp server that osCommanding.py could set up temporarily. And there is no need to be root, doing it the TCP way. I'd appreciate any feedback. Thanks, Daniel 2012/8/30 Andres Riancho <andres.rian...@gmail.com> > Martin, > > On Wed, Aug 29, 2012 at 3:01 PM, Martin Alderete <malder...@gmail.com> > wrote: > > Hi guys! > > > >> I like the idea, it's actually a very good one. Some comments though: > >> > >> * The penalty for using scapy is that the user needs to be root, and > >> we don't want to ask users to run w3af as root for running a simple > >> scan. On the other side, the idea is good and should be implemented, > >> so what I recommend is to have something that looks like this: > >> > > > > I agree!! > > > >> if user_running_as_root(): > >> start_sniffing() > >> send_requests_that_will_ping_back_to_us() > >> stop_sniffing() > >> analyze_packets() > >> else: > >> warn_user_that_technique_is_only_available_when_root() > >> > > > > Some comments about the code layout: > > You can develop that using Python's decorator instead of if-else > statment. > > The code could look like : > > > > @require_root > > def my_custom_scan(params, kwds_params): > > start_sniffing() > > send_requests_that_will_ping_back_to_us() > > stop_sniffing() > > analyze_packets() > > > > That way is more flexible, and you are able to focus just in the logic > of > > the *process*(scan, exploit, etc) > > Agreed, implementation looks nicer with something like that, and when > we implement the second, third, N-th technique that requires root, > code will look even nicer than the if-else option. > > > I hope you find it useful, > > Sure! > > PD: Bienvenido a la lista, es bueno ver mas Argentinos por aqui :) > > > Cheers, > > > > > > -- > > Alderete, Martin Nicolas > > NINJA-IDE Core Developer > > Senior Python Developer > > > > > ------------------------------------------------------------------------------ > > Live Security Virtual Conference > > Exclusive live event will cover all the ways today's security and > > threat landscape has changed and how IT managers can respond. Discussions > > will include endpoint security, mobile security and the latest in malware > > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > > _______________________________________________ > > W3af-develop mailing list > > W3af-develop@lists.sourceforge.net > > https://lists.sourceforge.net/lists/listinfo/w3af-develop > > > > > > -- > Andrés Riancho > Project Leader at w3af - http://w3af.org/ > Web Application Attack and Audit Framework > Twitter: @w3af > GPG: 0x93C344F3 > > > ------------------------------------------------------------------------------ > Live Security Virtual Conference > Exclusive live event will cover all the ways today's security and > threat landscape has changed and how IT managers can respond. Discussions > will include endpoint security, mobile security and the latest in malware > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ > _______________________________________________ > W3af-develop mailing list > W3af-develop@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/w3af-develop >
osCommanding.py.diff
Description: Binary data
------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________ W3af-develop mailing list W3af-develop@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/w3af-develop