Nmap Development mailing list archives

Re: hi, i've a problem with wireless card and nmap execution


From: "DePriest, Jason R." <jrdepriest () gmail com>
Date: Thu, 17 May 2007 14:16:31 -0500

On 5/17/07, oscar miranda <> wrote:
HI, I'D TRIED TO DO ON MY LAPTOP WITH WINDOWS XP, WITH A 802.11g USB
2.0Wireless LAN Adapter, BUT I HAVE THIS RESULTS:
D:\>nmap --privileged -F -T5 -sS --osscan-guess -O --no-stylesheet -oX "
fcc.cs.buap.mx.xml " 148.228.10.1-9
Starting Nmap 4.21ALPHA4 ( http://insecure.org ) at 2007-05-17 12:46 Hora
estßndar de MÚxico
dnet: Failed to open device eth1
QUITTING!

I THINK THIS COULD CAUSE BECAUSE NMAP DOESN'T SUPPORT THE WIRELESS LAN
ADAPTER O MAYBE NMAP COULDN'T FIND THE LAN ADAPTER, AND I APRETIATE SO MUCH
IF YOU CAN TELL ME HOW SHOULD I SOLVE THE PROBLEM, OR HOW TO CHOOSE THE
CORRECT ADAPTER, THANKS.


First, you should try nmap --iflist to get a list of your interfaces.

If you see your WiFi adapter there, run nmap with the -e flag and the
name of your WiFi adapters.

-Jason

For example...
C:\>nmap --iflist

Starting Nmap 4.20 ( http://insecure.org ) at 2007-05-17 14:14 Central
Daylight Time
************************INTERFACES************************
DEV  (SHORT) IP/MASK           TYPE     UP   MAC
eth0 (eth0)  (null)/0          ethernet down 00:13:D3:6C:AB:FE
eth1 (eth1)  (null)/0          ethernet down 00:40:45:29:48:15
ppp0 (ppp0)  68.243.226.110/32 other    up
lo0  (lo0)   127.0.0.1/8       loopback up

**************************ROUTES**************************
DST/MASK           DEV  GATEWAY
xx.xx.xx.xx/32     ppp0 xx.xx.xx.xx
xx.xx.xx.xx/32     lo0  127.0.0.1
xx.xx.xx.xx/32     ppp0 xx.xx.xx.xx
xx.xx.xx.xx/32     ppp0 xx.xx.xx.xx
xx.xx.xx.xx/32     ppp0 xx.xx.xx.xx
xx.xx.xx.xx/32     ppp0 xx.xx.xx.xx
127.0.0.0/0        lo0  127.0.0.1
224.0.0.0/0        ppp0 xx.xx.xx.xx
0.0.0.0/0          ppp0 xx.xx.xx.xx


C:\>nmap -e eth1 host.domain.com

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: