1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-29 10:59:02 +00:00

TODO update

Accomplishments:
* Added 117 new signatures to http-enum for a new total of 223! These new signatures are all from vulnerable web applications taken from exploit-db.com's archives from July 1 2009 until May 30 2011. I only checked advisories with more than 300 views to focus on the most popular apps and also did a quick Google search to make sure there are enough installations out there.
* Researched about malware detection methods in HTTP servers.
* Submitted http-default-accounts.nse to nmap-dev
* Fixed a bug in http.lua. The argument 'http.pipeline' was not being read correctly.
* Submitted http-unsafe-host.nse to nmap-dev
* Added more signatures to http-default-accounts
* Submitted http-wp-enum to nmap-dev

Priorities:
* Work on more NSE scripts
* Polish documentation in all my scripts
* Add more signatures to http-default-accounts
This commit is contained in:
paulino
2011-07-05 03:51:39 +00:00
parent abf2a20866
commit 7b83ec9370

View File

@@ -1,8 +1,15 @@
PENDING:
-Add more signatures for http-default-accounts
-Select new scripts to work on
-Write more signatures for http-default-accounts
-Select new scripts from queue and work on them
-Improve my documentation
COMPLETED:
-Write http-wp-enum
-Write http-malware-host
-Write more signatures for http-default-accounts
-Research more about spidering
-Add more signatures for http-default-accounts
-Select new scripts to work on
-Completed http-default-accounts
-Added new signatures to http-enum
-Work on the http-waf-detect