Difference between revisions of "Summerschool Aachen 2005/Challenges"
(→Open Challenges) |
|||
Line 23: | Line 23: | ||
* Look into timing/fingerprinting SSH | * Look into timing/fingerprinting SSH | ||
** (avoidance) | ** (avoidance) | ||
+ | * Write a chaoter for [/TheBook] |
Revision as of 10:39, 22 September 2005
- Daniel & Yves - glibc 2.3.5 look at how to exploit heap-based overflows (avoiding the checks)
- Typo & Ilja - 0wn putty
- Update: We found some exploitable bugs. --Typo 18:10, 20 Sep 2005 (CEST)
- Christian feat. Max - verBOTen - a bot that mirrors only that stuff that is protected by robots.txt
- Max: Exif_Thumb finish last years project - done see [1]
Open Challenges
- extend p0f to fingerrprint ScaPy (default) packets
- find a way to fingerprint
- Build an HTTP-Infrastructure Fingerprinting Tool
- Scan our strange network, fingerprint the stuff in there, modify existing fingerprinting tools to do so
- Find out how httprint works
- Build a minimal DHCP Server on ScaPy
- Build an Fingerprinting Tool for
- dhcp
- rsync
- ssh
- ssl
- Look into timing/fingerprinting SSH
- (avoidance)
- Write a chaoter for [/TheBook]