Nmap Development mailing list archives

win7 and broadcast scripts:


From: "Mike ." <dmciscobgp () hotmail com>
Date: Thu, 21 Jan 2016 18:04:03 +0000

hello all


i am making one last post about these broadcast scripts i continue to have issues with. i would like to see anyone 
running windows 7 to chime in here. i am asking you to test the 3 following broadcast scripts that , no matter what i 
try, i cannot get to work right. UPNP/RIPNG/and RIP. there are a couple others, but those are the main culprits for me. 
i tested every broadcast script so i know that mcast packets are being sent at various times. why these 3 don't work, 
leaves me shaking my head! my setup is super simple: win7, one net card (promiscuous), one modem/router, and ethernet 
connected. i run windump or tshark for packet capture. with all other scripts besides the above, i see, just fine, 
packets sent out. this is the RIP broadcast one i am having issues with. notice with packet trace on, all appears to 
work, right?


Starting Nmap 7.00 ( https://nmap.org ) at 2016-01-21 11:56 Central Standard Time
NSOCK INFO [0.0930s] nsock_iod_new2(): nsock_iod_new (IOD #1)
NSOCK INFO [0.0930s] nsock_setup_udp(): UDP unconnected socket (IOD #1)
NSOCK INFO [1.5430s] nsock_sendto(): Sendto request for 24 bytes to IOD #1 EID
1 [224.0.0.9:520]
NSE: UDP 0.0.0.0:0 > 224.0.0.9:520 | 00000000: 01 02 00 00 00 00 00 00 00 00 00
00 00 00 00 00
00000010: 00 00 00 00 00 00 00 10

NSOCK INFO [1.5450s] nsock_trace_handler_callback(): Callback: WRITE SUCCESS fo
 EID 11 [224.0.0.9:520]
NSE: UDP 0.0.0.0:51489 > 224.0.0.9:520 | SEND
NSOCK INFO [1.5450s] nsock_read(): Read request from IOD #1 [224.0.0.9:520] (ti
eout: 5000ms) EID 18
NSOCK INFO [6.5460s] nsock_trace_handler_callback(): Callback: READ TIMEOUT for
EID 18 [224.0.0.9:520]
NSE: UDP 0.0.0.0:51489 > 224.0.0.9:520 | CLOSE
NSOCK INFO [6.5460s] nsock_iod_delete(): nsock_iod_delete (IOD #1)
WARNING: No targets were specified, so 0 hosts scanned.
Nmap done: 0 IP addresses (0 hosts up) scanned in 6.55 seconds



now i am assuming that is hitting the wire? not according to any of my sniffers! case in point:


windump: listening on \Device\NPF_{E6793762-9633-432B-B8A6-B4C2F6AA5179}...............................(still waiting)



last thing i have is this for bewilderment. notice the first 0.0.0.0:0 (why is this set as a source port number)? then 
notice the change later. that i don't get. is that why i am not seeing anything or why the script doesnt run? am i 
missing an arg? sorry to keep harping on these scripts but damn, everything else works in nmap on this box why not 
these!? just driving me nuts, that's all


thank you again!

Mike


_______________________________________________
Sent through the dev mailing list
https://nmap.org/mailman/listinfo/dev
Archived at http://seclists.org/nmap-dev/

Current thread: