Open DrDinosaur opened 10 years ago
I guess my first question, what version of e-c? Also, is this the range for the broadcast domain you are actually sitting in? (if you are in 192.168.2.0/24, then it wont work) Under the hood, all this is doing is an ARP scan via nmap for hosts
Also I notice you put 192.168.1.1/24, normaily you would put 192.168.1.0/24. Not sure if that is an issue or not.
Thanks, Eric
On Mon, Jun 9, 2014 at 4:25 AM, DrDinosaur notifications@github.com wrote:
After selecting Poisoning Attacks and then Create Victim Host List, the network range isn't registering.
Enter your target network range (nmap format): 192.168.1.1/24 Enter your target network range (nmap format): Enter your target network range (nmap format): 192.168.1.0-255 Enter your target network range (nmap format):
— Reply to this email directly or view it on GitHub https://github.com/brav0hax/easy-creds/issues/16.
Version 3.8-dev
Yes, I'm in the 192.168.1.x LAN.
Yep, it's just doing an ARP scan in nmap.
root@Kali:~# nmap -sn -PR 192.168.1.0-255 Starting Nmap 6.46 ( http://nmap.org ) at 2014-06-09 22:32 HST ... Nmap done: 256 IP addresses (7 hosts up) scanned in 28.63 seconds
nmap -sn -PR 192.168.1.1/24 Starting Nmap 6.46 ( http://nmap.org ) at 2014-06-09 22:33 HST ... Nmap done: 256 IP addresses (8 hosts up) scanned in 28.55 seconds
If nmap can do it, easy-creds should, so I'm not sure what the issue its.
Using 192.168.1.0/24 did work though for some reason.
After selecting Poisoning Attacks and then Create Victim Host List, the network range isn't registering.
Enter your target network range (nmap format): 192.168.1.1/24 Enter your target network range (nmap format): Enter your target network range (nmap format): 192.168.1.0-255 Enter your target network range (nmap format):