Nmap Development mailing list archives
Re: Bug in IP Parsing
From: Andreas Ericsson <ae () op5 se>
Date: Thu, 20 Oct 2005 21:11:58 +0200
Juan Perez wrote:
There seems to be a bug in the IP parsing mechanism. Example: input file: test test is only two lines: 10.10.0.0/24 10.10.0.80/24 The bug is that the second line is an invalid combination and therefore should be rejected.Instead, nmap ignores the last octet(80) and proceeds to parse it as 10.10.0.0/24 .
This isn't exactly a bug as such, but rather by design so you can say "Scan this host and it's entire network segment". It's really rather nifty if you have more complex netmasks than the 24-bit variant and you just don't feel like figuring out the network address. Although nmap should remove duplicates, so the monster output that ended your original mail is a bit weird. -- Andreas Ericsson andreas.ericsson () op5 se OP5 AB www.op5.se Tel: +46 8-230225 Fax: +46 8-230231 _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev
Current thread:
- Bug in IP Parsing Juan Perez (Oct 20)
- Re: Bug in IP Parsing Andreas Ericsson (Oct 20)
- RE: Bug in IP Parsing Brandon Enright (Oct 20)