Penetration Testing mailing list archives

RE: mac to ip address tools


From: "Carl-Johan Bostorp" <carl-johan.bostorp () hps se>
Date: Wed, 26 Oct 2005 15:19:29 +0200

Another option is that some device is answering to those addresses because the route to those addresses goes through 
it. I noticed this in action once when I was doing this, and it turned out that my vlan-enabled gateway answered to 
everyone who wasn't available within my segment.

/C-J

-----Original Message-----
From: kukulkan [mailto:ismandya () sains com my]
Sent: on 2005-10-26 02:44
To: Chris Moody
Cc: Glyn Geoghegan; pen-test () securityfocus com
Subject: Re: mac to ip address tools
 
yeah. There are about 500-600 machines in this place, I say this because 
these are the registered machines. What about those not registered? 
there is one thing that bother them is that when we tried to use arp it 
seems that they are about 100  machines  with the same mac address. 
Wonder could this be the the machines here have been poisoned?

Chris Moody wrote:

The biggest problem with your question lies in topology restrictions.

Unless you have a host system in the broadcast domain (aka subnet) of 
the host ip in question, all your arp responses will be that of the 
gateway enroute to the end host.

You'll get -very- skewed results if you're trying to map say...1000 
machines (most of which live on different subnets) and see nothing but 
the MAC of your router as the resolved address.

For something enterprise wide, you will need to look at scripting a 
arp cache harvesting mechanism.  This can report back the REAL mac to 
ip mapping for the host system.

Contact me offline for more information on how to accomplish this.

-Chris

Glyn Geoghegan wrote:

arp -a

--  G l y n   G e o g h e g a n


On 25 Oct 2005, at 10:48, kukulkan wrote:

Hi list,

Need help. Is there any open source tools linux or windows, that  
when given a MAC address, the list(s) of IP address can be obtained?

kukulkan


---------------------------------------------------------------------- 
--------
Audit your website security with Acunetix Web Vulnerability Scanner:
Hackers are concentrating their efforts on attacking applications  
on your website. Up to 75% of cyber attacks are launched on  
shopping carts, forms, login pages, dynamic content etc. Firewalls,  
SSL and locked-down servers are futile against web application  
hacking. Check your website for vulnerabilities to SQL injection,  
Cross site scripting and other web attacks before hackers do!  
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
---------------------------------------------------------------------- 
---------




------------------------------------------------------------------------------ 

Audit your website security with Acunetix Web Vulnerability Scanner:
Hackers are concentrating their efforts on attacking applications on 
your website. Up to 75% of cyber attacks are launched on shopping 
carts, forms, login pages, dynamic content etc. Firewalls, SSL and 
locked-down servers are futile against web application hacking. Check 
your website for vulnerabilities to SQL injection, Cross site 
scripting and other web attacks before hackers do! Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
------------------------------------------------------------------------------- 






------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner: 

Hackers are concentrating their efforts on attacking applications on your 
website. Up to 75% of cyber attacks are launched on shopping carts, forms, 
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are 
futile against web application hacking. Check your website for vulnerabilities 
to SQL injection, Cross site scripting and other web attacks before hackers do! 
Download Trial at:

http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------




Current thread: