Nmap Development mailing list archives

Re: Nmap 4.23RC3 released


From: Alan Jones <alan () ajsquared us>
Date: Thu, 29 Nov 2007 08:01:19 -0600

David Fifield <david_at_bamsoftware.com 
<mailto:david_at_bamsoftware.com?Subject=Re:%20Nmap%204.23RC3%20released>>
Date: Thu, 29 Nov 2007 01:54:43 -0700


/>> ************************INTERFACES************************ /
/>> DEV (SHORT) IP/MASK TYPE UP MAC /
/>> eth0 (eth0) (null)/0 ethernet up BC:D6:20:52:41:53 /
/>> eth1 (eth1) (null)/0 ethernet up BC:D6:20:52:41:53 /
/>> eth2 (eth2) (null)/0 ethernet up BC:D6:20:52:41:53 /
/>> eth3 (eth3) (null)/0 ethernet up BC:D6:20:52:41:53 /
/>> eth4 (eth4) 192.168.1.67/24 ethernet up 00:19:D1:92:05:BE /
/>> eth5 (eth5) (null)/0 ethernet up 00:19:D1:92:05:BE /
/>> ppp0 (ppp0) (null)/0 other up /
/>> ppp1 (ppp1) (null)/0 other down /
/>> lo0 (lo0) 127.0.0.1/8 loopback up /
/>> net0 (net0) (null)/0 other up /
/>> net1 (net1) (null)/0 other up /
/>> net2 (net2) (null)/0 other up /
/>> net3 (net3) (null)/0 other up /

Okay, another question. Do those "net*" interfaces show up with
"nmap --iflist" with version 4.23RC2? When I made a change hoping to
make Windows interface aliases work I might have brought these tunnel
interfaces to light.

It looks the same but just in case here is the info.....

nmap --iflist

Starting Nmap 4.23RC2 ( http://insecure.org ) at 2007-11-29 07:56 
Central Standa
rd Time
************************INTERFACES************************
DEV  (SHORT) IP/MASK         TYPE     UP   MAC
eth0 (eth0)  (null)/0        ethernet up   BC:D6:20:52:41:53
eth1 (eth1)  (null)/0        ethernet up   BC:D6:20:52:41:53
eth2 (eth2)  (null)/0        ethernet up   BC:D6:20:52:41:53
eth3 (eth3)  (null)/0        ethernet up   BC:D6:20:52:41:53
eth4 (eth4)  192.168.1.67/24 ethernet up   00:19:D1:92:05:BE
eth5 (eth5)  (null)/0        ethernet up   00:19:D1:92:05:BE
ppp0 (ppp0)  (null)/0        other    up
ppp1 (ppp1)  (null)/0        other    down
lo0  (lo0)   127.0.0.1/8     loopback up
net0 (net0)  (null)/0        other    up
net1 (net1)  (null)/0        other    up
net2 (net2)  (null)/0        other    up
net3 (net3)  (null)/0        other    up

DEV  WINDEVICE
net2 \Device\NPF_{E9EB691E-86F7-4F86-936A-240DBE6B5BBA}
net3 \Device\NPF_{CA1F13BF-9B24-436D-9303-8DE208BE47C3}

**************************ROUTES**************************
DST/MASK           DEV  GATEWAY
192.168.1.67/32    eth4 192.168.1.67
255.255.255.255/32 lo0  127.0.0.1
127.0.0.1/32       lo0  127.0.0.1
127.255.255.255/32 lo0  127.0.0.1
192.168.1.255/32   eth4 192.168.1.67
255.255.255.255/32 eth4 192.168.1.67
192.168.1.0/0      eth4 192.168.1.67
127.0.0.0/0        lo0  127.0.0.1
224.0.0.0/0        eth4 192.168.1.67
224.0.0.0/0        lo0  127.0.0.1
0.0.0.0/0          eth4 192.168.1.254




_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: