Nmap Development mailing list archives

Re: Bug in IP Parsing


From: Andreas Ericsson <ae () op5 se>
Date: Thu, 20 Oct 2005 21:11:58 +0200

Juan Perez wrote:
There seems to be a bug in the IP parsing mechanism.

Example:

input file: test

test is only two lines:

10.10.0.0/24
10.10.0.80/24

The bug is that the second line is an invalid combination and
therefore should be rejected.Instead, nmap ignores the last
octet(80) and proceeds to parse it as 10.10.0.0/24 .


This isn't exactly a bug as such, but rather by design so you can say 
"Scan this host and it's entire network segment". It's really rather 
nifty if you have more complex netmasks than the 24-bit variant and you 
just don't feel like figuring out the network address.

Although nmap should remove duplicates, so the monster output that ended 
your original mail is a bit weird.

-- 
Andreas Ericsson                   andreas.ericsson () op5 se
OP5 AB                             www.op5.se
Tel: +46 8-230225                  Fax: +46 8-230231


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev


Current thread: