Nmap Development mailing list archives

Follow up to NMAP on Snow Leopard with VMWARE Fusion installed


From: "James R. Marcus" <jmarcus () edhance com>
Date: Fri, 18 Sep 2009 09:48:55 -0400

Should I post this some where else?

I have been reading the thread titled:  Trying out nmap 5 with snow  
leopard - public release

I have updated nmap with the latest build. Nmap 5.05BETA1

nmap is a tool I use every day so, it is one of the most valuable  
tools I have used in my careers as a system administrator.

I am running the latest version of VMWARE Fusion and my understanding  
is that others have had problems with running nmap on a machine that  
has Fusion installed.

I have ran many of the same commands listed in the orginal thread I  
hope this is helpful.

Thanks,
James

Sheepchase:~ jmarcus$ nmap --iflist

Starting Nmap 5.05BETA1 ( http://nmap.org ) at 2009-09-18 09:26 EDT
Warning: Unable to open interface en0 -- skipping it.
Warning: Unable to open interface vmnet8 -- skipping it.
Warning: Unable to open interface vmnet1 -- skipping it.
************************INTERFACES************************
DEV (SHORT) IP/MASK     TYPE     UP MAC
lo0 (lo0)   127.0.0.1/8 loopback up

WARNING: Unable to find appropriate interface for system route to  
10.10.200.1 (Repeated many times)
**************************ROUTES**************************
DST/MASK        DEV GATEWAY
10.10.200.60/32 lo0 127.0.0.1
127.0.0.1/32    lo0 127.0.0.1
127.0.0.0/0     lo0 127.0.0.1

Sheepchase:~ jmarcus$ sudo nmap --send-ip 10.10.200.60

Starting Nmap 5.05BETA1 ( http://nmap.org ) at 2009-09-18 09:29 EDT
Warning: Unable to open interface vmnet8 -- skipping it.
Warning: Unable to open interface vmnet1 -- skipping it.

Sheepchase:~ jmarcus$ sudo nmap --packet-trace 10.10.200.38

Starting Nmap 5.05BETA1 ( http://nmap.org ) at 2009-09-18 09:37 EDT
Warning: Unable to open interface vmnet8 -- skipping it.
Warning: Unable to open interface vmnet1 -- skipping it.
SENT (0.0370s) ARP who-has 10.10.200.38 tell 10.10.200.60

Sheepchase:~ jmarcus$  sudo tcpdump -n -i en0 -w nmap-arp.pcap arp and  
host 10.10.200.38
tcpdump: listening on en0, link-type EN10MB (Ethernet), capture size  
65535 bytes
^C2 packets captured
3527 packets received by filter
0 packets dropped by kernel

Sheepchase:~ jmarcus$ tcpdump -r nmap-arp.pcap
reading from file nmap-arp.pcap, link-type EN10MB (Ethernet)
09:37:14.175832 ARP, Request who-has 10.10.200.38 (Broadcast) tell  
10.10.200.60, length 28
09:37:14.176126 ARP, Reply 10.10.200.38 is-at 00:0c:29:a1:3a:c2 (oui  
Unknown), length 46






_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: