brav0hax / easy-creds

274 stars 97 forks source link

"Nmap format" not working #16

Open DrDinosaur opened 10 years ago

DrDinosaur commented 10 years ago

After selecting Poisoning Attacks and then Create Victim Host List, the network range isn't registering.

Enter your target network range (nmap format): 192.168.1.1/24 Enter your target network range (nmap format): Enter your target network range (nmap format): 192.168.1.0-255 Enter your target network range (nmap format):

brav0hax commented 10 years ago

I guess my first question, what version of e-c? Also, is this the range for the broadcast domain you are actually sitting in? (if you are in 192.168.2.0/24, then it wont work) Under the hood, all this is doing is an ARP scan via nmap for hosts

Also I notice you put 192.168.1.1/24, normaily you would put 192.168.1.0/24. Not sure if that is an issue or not.

Thanks, Eric

On Mon, Jun 9, 2014 at 4:25 AM, DrDinosaur notifications@github.com wrote:

After selecting Poisoning Attacks and then Create Victim Host List, the network range isn't registering.

Enter your target network range (nmap format): 192.168.1.1/24 Enter your target network range (nmap format): Enter your target network range (nmap format): 192.168.1.0-255 Enter your target network range (nmap format):

— Reply to this email directly or view it on GitHub https://github.com/brav0hax/easy-creds/issues/16.

DrDinosaur commented 10 years ago

Version 3.8-dev

Yes, I'm in the 192.168.1.x LAN.

Yep, it's just doing an ARP scan in nmap.

root@Kali:~# nmap -sn -PR 192.168.1.0-255 Starting Nmap 6.46 ( http://nmap.org ) at 2014-06-09 22:32 HST ... Nmap done: 256 IP addresses (7 hosts up) scanned in 28.63 seconds

nmap -sn -PR 192.168.1.1/24 Starting Nmap 6.46 ( http://nmap.org ) at 2014-06-09 22:33 HST ... Nmap done: 256 IP addresses (8 hosts up) scanned in 28.55 seconds

If nmap can do it, easy-creds should, so I'm not sure what the issue its.

Using 192.168.1.0/24 did work though for some reason.