Open juliourena opened 7 years ago
Hi guys, thanks for doing this awesome tool, I loved it!
I'm facing a problem with a host, when I try to scan it I get nothing, but actually nmap get the open ports. Note it works with other hosts.
Here the outputs:
#version root@kali:~/Desktop/oscp/masscan/bin# ./masscan -V Masscan version 1.0.4 ( https://github.com/robertdavidgraham/masscan ) Compiled on: Nov 10 2017 16:52:35 Compiler: gcc 4.2.1 Compatible Clang 3.8.1 (tags/RELEASE_381/final) OS: Linux CPU: x86 (32 bits) GIT version: 1.0.4-55-g51da058 #masscan output root@kali:~/Desktop/oscp/masscan/bin# ./masscan 192.168.6.116 -p22,80,443 -vv pcap: found library: libpcap.so pcap: pcap_dev_name: failed pcap: pcap_dev_description: failed pcap: pcap_dev_next: failed pcap: pcap_sendqueue_alloc: failed pcap: pcap_sendqueue_transmit: failed pcap: pcap_sendqueue_destroy: failed pcap: pcap_sendqueue_queue: failed pfring: error: dlopen('libpfring.so'): No such file or directory initializing adapter auto-detected: interface=eth0 auto-detected: adapter-ip=192.168.6.117 eth0: type=0x 1 auto-detected: adapter-mac=00-0c-29-ea-ca-bc pcap: libpcap version 1.8.1 pcap:'eth0': opening... pcap:'eth0': successfully opened rawsock: looking for default gateway auto-detected: router-ip=192.168.6.99 auto-detected: router-mac=00-ff-8a-4a-42-b2 adapter initialization done. THREAD: xmit: starting thread #0 Starting masscan 1.0.4 (http://bit.ly/14GZzcT) at 2017-11-10 20:57:53 GMT THREAD: recv: starting thread #0 maxrate = 100.00 -- forced options: -sS -Pn -n --randomize-hosts -v --send-eth Initiating SYN Stealth Scan Scanning 1 hosts [3 ports/host] THREAD: status: starting thread THREAD: recv: starting main loop 0:00:00 remaining, found=0 THREAD: xmit done, waiting for receive thread to realize this THREAD: xmit: stopping thread #0waiting 0-secs, found=0 THREAD: recv: stopping thread #0waiting 0-secs, found=0 THREAD: status: stopping thread waiting -1-secs, found=0 #nmap root@kali:~/Desktop/oscp/masscan/bin# nmap 192.168.6.116 -p22,80,443 Starting Nmap 7.60 ( https://nmap.org ) at 2017-11-10 16:58 AST Nmap scan report for 192.168.6.116 Host is up (0.00021s latency). PORT STATE SERVICE 22/tcp closed ssh 80/tcp filtered http 443/tcp filtered https MAC Address: 00:0C:29:A0:88:B5 (VMware) Nmap done: 1 IP address (1 host up) scanned in 1.64 seconds
I tried increasing the rate and got the results maybe you could get the same , check in the refereced issue
Hi guys, thanks for doing this awesome tool, I loved it!
I'm facing a problem with a host, when I try to scan it I get nothing, but actually nmap get the open ports. Note it works with other hosts.
Here the outputs: