Nmap Development mailing list archives

Re: -sP showing all hosts in request as up


From: David Fifield <david () bamsoftware com>
Date: Wed, 26 Aug 2009 09:53:45 -0600

On Wed, Aug 26, 2009 at 10:38:43AM -0500, Terry wrote:
On Wed, Aug 26, 2009 at 10:17 AM, David Fifield<david () bamsoftware com> wrote:
On Wed, Aug 26, 2009 at 09:58:30AM -0500, Terry wrote:
I am confused about some output I am seeing.  Why would nmap -sP
subnet/24 return every IP in the block as up when they clearly arent?
This happens even on the local subnet.  I have a feeling the answer is
very easy I am just stuck.

This can happen if a network device is faking ARP replies from
nonexistent hosts. Try scanning with the --send-ip option. This thread
has some more information.

http://seclists.org/nmap-dev/2009/q3/0338.html

Thank you for your reply.  Here's a little transcript of my problem
after trying the -send-ip option:

[root@omajelut01 sbin]# nmap -sP --send-ip --reason 10.0.1.112-120

Starting Nmap 5.00 ( http://nmap.org ) at 2009-08-26 10:33 CDT
Host 10.0.1.112 is up, received echo-reply (0.0029s latency).
Host 10.0.1.113 is up, received reset (0.00077s latency).
Host 10.0.1.114 is up, received echo-reply (0.0019s latency).
Host 10.0.1.115 is up, received reset (0.0011s latency).
Host 10.0.1.116 is up, received echo-reply (0.0026s latency).
Host 10.0.1.117 is up, received echo-reply (0.0024s latency).
Host 10.0.1.118 is up, received echo-reply (0.0024s latency).
Host 10.0.1.119 is up, received reset (0.00075s latency).
Host 10.0.1.120 is up, received echo-reply (0.0025s latency).
Nmap done: 9 IP addresses (9 hosts up) scanned in 3.30 seconds

[root@omajelut01 sbin]# ping -c 1 -W 2 10.0.1.113
PING 10.0.1.113 (10.0.1.113) 56(84) bytes of data.

--- 10.0.1.113 ping statistics ---
1 packets transmitted, 0 received, 100% packet loss, time 0ms

Nmap has a lot of ways to find out if a host is up, and ICMP echo (ping)
is just one of them. It's possible that Nmap finds a host up when ping
finds it down. Those hosts above that say "echo-reply" got a ping reply.
The ones that say "reset" got a RST from Nmap's ACK to port 80 or SYN to
port 443.

It is possible that there is a firewall or something spoofing the RST
replies. If you're sure those addresses are not really up you can try
looking for the device that's doing that.

David Fifield

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org

Current thread: