Home page logo

nmap-dev logo Nmap Development mailing list archives

FW: Zenmap from inside network
From: "Joe DeMicco" <joe_demicco () comcast net>
Date: Wed, 22 Apr 2009 07:34:02 -0400


I'm having difficultly getting Zenmap to change the source IP address. We're
running Zenmap on a 32 bit windows vista platform. We want to change the
source ip address to a public ip address so we can test firewall settings
from within the network and make the traffic seem to be coming from outside
the network. When we issue the -S option to change the source address and
hit the scan button this error message is returned: "Could not figure out
what device to send the packet out on with the source address you gave me!
If you are trying to sp00f your scan, this is normal, just give the -e eth0
or -e ppp0 or whatever.  Otherwise you can still use -e, but I find it
kindof fishy.

I don't know the network adapter string to use for the -e option. We have an
Atheros AR5007ER wireless network adapter. I appreciate your time and
patience regarding this matter.    

-----Original Message-----
From: Fyodor [mailto:fyodor () insecure org] 
Sent: Wednesday, April 22, 2009 6:14 AM
To: Joe DeMicco
Subject: Re: Zenmap from inside network

On Tue, Apr 21, 2009 at 10:38:08PM -0400, Joe DeMicco wrote:

I have a quick question to ask regarding changing the source ip address to
an public address so I can scan the incoming wan interface from inside the

Thanks for your question or report, but I think your best bet is to
resend it to the Nmap development mailing list (nmap-dev () insecure org)
instead.  That list is preferable for a few reasons:

o It has more than 1,700 members, so someone else may be able to
  resolve your question or issue instead of or more quickly than I

o Answers are archived at http://SecLists.Org and indexed by search
  engines, which reduces the number of times we have to answer the
  same questions.

o We use the mailing list to track issues which need to be resolved.

You are most likely to get an answer if your email includes all
relevant details.  See http://insecure.org/nmap/man/man-bugs.html for
the type of information which is frequently useful.

Sorry for the form letter, but there are millions of Nmap users and I
can't support them all myself.  But I and many other developers and
volunteers track the nmap-dev list closely.


Sent through the nmap-dev mailing list
Archived at http://SecLists.Org

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]