Penetration Testing mailing list archives

Re: Using ARP to map a network


From: "planz" <planz235 () hotmail com>
Date: Tue, 11 Feb 2003 17:17:27 +0800

In WLAN Sniffing mode, you need not be at the L2 but can sniff the traffic which flows in the air at L2.  You will have 
no clue about the IP range.  All you can do is, send a RARP to know IP addresses.  I just seeking some automated RARP 
tool, which can send queries to know IP addresses, as a script or whatever.

Thanks..!

----- Original Message ----- 
From: "Rob J Meijer" <rmeijer () xs4all nl>
To: <greg () gregschwartz net>; "planz" <planz235 () hotmail com>
Cc: <jlewis () packetnexus com>; <pen-test () securityfocus com>
Sent: Monday, February 10, 2003 3:22 AM
Subject: Re: Using ARP to map a network


On Wed, 5 Feb 2003, planz wrote:

I am also searching for a similar tool or perl script, which can do a RARP
to find IP addresses.  Currently I am doing this on WLAN.  I am able to
sniff MAC addresses of different WLAN clients and Access Points.  All I
have is a list of MAC addrresses. From here, I want to map the network.
I am tired of googled it. Some one please help...!


If you have L2 access to the segment and have any clue as what the ranges
might be, than a simple ARP scan will give you a list of IP/MAC pairs.
Further if you have a clue with respect to connected network ranges, ARP
scanning for these segments will in many cases give you the routers that
do routing to these other segments.
If you are unable to find an ARP scanning tool, I have some alpha grade
perl scripts for the Linux platform if you are interested and not afraid
of rewriting some lines of perl yourself.

Rob


----------------------------------------------------------------------------
This list is provided by the SecurityFocus Security Intelligence Alert (SIA)
Service. For more information on SecurityFocus' SIA service which
automatically alerts you to the latest security vulnerabilities please see:
https://alerts.securityfocus.com/

Attachment: smime.p7s
Description:


Current thread: