Nmap Development mailing list archives
Re: Nmap 4.23RC3 released
From: Alan Jones <alan () ajsquared us>
Date: Thu, 29 Nov 2007 08:01:19 -0600
David Fifield <david_at_bamsoftware.com <mailto:david_at_bamsoftware.com?Subject=Re:%20Nmap%204.23RC3%20released>> Date: Thu, 29 Nov 2007 01:54:43 -0700
/>> ************************INTERFACES************************ / />> DEV (SHORT) IP/MASK TYPE UP MAC / />> eth0 (eth0) (null)/0 ethernet up BC:D6:20:52:41:53 / />> eth1 (eth1) (null)/0 ethernet up BC:D6:20:52:41:53 / />> eth2 (eth2) (null)/0 ethernet up BC:D6:20:52:41:53 / />> eth3 (eth3) (null)/0 ethernet up BC:D6:20:52:41:53 / />> eth4 (eth4) 192.168.1.67/24 ethernet up 00:19:D1:92:05:BE / />> eth5 (eth5) (null)/0 ethernet up 00:19:D1:92:05:BE / />> ppp0 (ppp0) (null)/0 other up / />> ppp1 (ppp1) (null)/0 other down / />> lo0 (lo0) 127.0.0.1/8 loopback up / />> net0 (net0) (null)/0 other up / />> net1 (net1) (null)/0 other up / />> net2 (net2) (null)/0 other up / />> net3 (net3) (null)/0 other up /
Okay, another question. Do those "net*" interfaces show up with "nmap --iflist" with version 4.23RC2? When I made a change hoping to make Windows interface aliases work I might have brought these tunnel interfaces to light.
It looks the same but just in case here is the info..... nmap --iflist Starting Nmap 4.23RC2 ( http://insecure.org ) at 2007-11-29 07:56 Central Standa rd Time ************************INTERFACES************************ DEV (SHORT) IP/MASK TYPE UP MAC eth0 (eth0) (null)/0 ethernet up BC:D6:20:52:41:53 eth1 (eth1) (null)/0 ethernet up BC:D6:20:52:41:53 eth2 (eth2) (null)/0 ethernet up BC:D6:20:52:41:53 eth3 (eth3) (null)/0 ethernet up BC:D6:20:52:41:53 eth4 (eth4) 192.168.1.67/24 ethernet up 00:19:D1:92:05:BE eth5 (eth5) (null)/0 ethernet up 00:19:D1:92:05:BE ppp0 (ppp0) (null)/0 other up ppp1 (ppp1) (null)/0 other down lo0 (lo0) 127.0.0.1/8 loopback up net0 (net0) (null)/0 other up net1 (net1) (null)/0 other up net2 (net2) (null)/0 other up net3 (net3) (null)/0 other up DEV WINDEVICE net2 \Device\NPF_{E9EB691E-86F7-4F86-936A-240DBE6B5BBA} net3 \Device\NPF_{CA1F13BF-9B24-436D-9303-8DE208BE47C3} **************************ROUTES************************** DST/MASK DEV GATEWAY 192.168.1.67/32 eth4 192.168.1.67 255.255.255.255/32 lo0 127.0.0.1 127.0.0.1/32 lo0 127.0.0.1 127.255.255.255/32 lo0 127.0.0.1 192.168.1.255/32 eth4 192.168.1.67 255.255.255.255/32 eth4 192.168.1.67 192.168.1.0/0 eth4 192.168.1.67 127.0.0.0/0 lo0 127.0.0.1 224.0.0.0/0 eth4 192.168.1.67 224.0.0.0/0 lo0 127.0.0.1 0.0.0.0/0 eth4 192.168.1.254 _______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- Nmap 4.23RC3 released Fyodor (Nov 27)
- <Possible follow-ups>
- Nmap 4.23RC3 released Alan Jones (Nov 27)
- Re: Nmap 4.23RC3 released Fyodor (Nov 28)
- Re: Nmap 4.23RC3 released Gianluca Varenni (Nov 28)
- RE: Nmap 4.23RC3 released Sina Bahram (Nov 28)
- Re: Nmap 4.23RC3 released Alan Jones (Nov 28)
- Re: Nmap 4.23RC3 released David Fifield (Nov 28)
- RE: Nmap 4.23RC3 released Sina Bahram (Nov 28)
- Re: Nmap 4.23RC3 released Fyodor (Nov 28)
- Re: Nmap 4.23RC3 released Alan Jones (Nov 28)
- Re: Nmap 4.23RC3 released David Fifield (Nov 29)
- Re: Nmap 4.23RC3 released Alan Jones (Nov 29)