Nmap Development mailing list archives

Re: zenmap doesn't scan my user mode linux image


From: Toralf Förster <toralf.foerster () gmx de>
Date: Thu, 11 Mar 2010 10:04:02 +0100


David Fifield wrote at 21:04:02

It would be very helpful if you could retest with version 5.00 to
confirm that. It will be much easier to fix if you can find a version
that definitely works.

David Fifield

Well, I found the difference. Since some time I' use wlan instead of a cable 
at the office. If I use the cable then it works well.

Probably this information are interestign for you :

n22 ~ # nmap  n22_uml                                                  

Starting Nmap 5.21 ( http://nmap.org ) at 2010-03-11 10:00 CET
Nmap scan report for n22_uml (192.168.1.50)                   
Host is up (0.000050s latency).                               
rDNS record for 192.168.1.50: n22_uml.uml_domain              
Not shown: 990 closed ports                                   
PORT     STATE SERVICE                                        
22/tcp   open  ssh                                            
25/tcp   open  smtp                                           
53/tcp   open  domain                                         
80/tcp   open  http                                           
111/tcp  open  rpcbind                                        
143/tcp  open  imap                                           
443/tcp  open  https                                          
631/tcp  open  ipp                                            
2049/tcp open  nfs                                            
3306/tcp open  mysql                                          

Nmap done: 1 IP address (1 host up) scanned in 0.14 seconds
n22 ~ # nmap --iflist                                      

Starting Nmap 5.21 ( http://nmap.org ) at 2010-03-11 10:02 CET
************************INTERFACES************************
DEV  (SHORT) IP/MASK          TYPE     UP MAC
lo   (lo)    127.0.0.1/8      loopback up
eth0 (eth0)  9.155.133.183/25 ethernet up 00:24:7E:11:75:C4
eth0 (eth0)  192.168.0.254/24 ethernet up 00:24:7E:11:75:C4
tap0 (tap0)  192.168.0.253/32 ethernet up 1E:84:E6:ED:17:16

**************************ROUTES**************************
DST/MASK        DEV  GATEWAY
192.168.1.50/32 tap0
9.155.133.128/1 eth0
192.168.0.0/0   eth0
127.0.0.0/0     lo
0.0.0.0/0       eth0 9.155.133.129

n22 ~ #
n22 ~ # route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.1.50    0.0.0.0         255.255.255.255 UH    0      0        0 tap0
9.155.133.128   0.0.0.0         255.255.255.128 U     0      0        0 eth0
192.168.0.0     0.0.0.0         255.255.255.0   U     0      0        0 eth0
127.0.0.0       0.0.0.0         255.0.0.0       U     0      0        0 lo
0.0.0.0         9.155.133.129   0.0.0.0         UG    0      0        0 eth0


-- 
MfG/Sincerely
Toralf Förster

pgp finger print: 7B1A 07F4 EC82 0F90 D4C2 8936 872A E508 7DB6 9DA3

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: