Nmap Development mailing list archives

Re: nmap problem


From: "Gianluca Varenni" <gianluca.varenni () gmail com>
Date: Thu, 16 Aug 2007 15:04:31 -0700

Have you run the command prompt in which you execute nmap with elevated 
privileges? You do that by right-clicking on the command prompt link and 
using "Run as administrator".

Have a nice day
GV

----- Original Message ----- 
From: "Daniel Johns" <daniel () synchronicitylive com>
To: <nmap-dev () insecure org>
Sent: Thursday, August 16, 2007 9:30 AM
Subject: FW: nmap problem


Sorry, I forgot to include what version of nmap in a previous email.  I am
attempting to use 2.40 nmap. thanks



From: Daniel Johns [mailto:daniel () synchronicitylive com]
Sent: Thursday, August 16, 2007 12:29 PM
To: 'nmap-dev () insecure org'
Subject: nmap problem



Hello,

I am trying to use nmap on windows vista business 32bit.  I have winpcap
4.0.1 installed. and I get this fallowing error when trying to do any type
of nmap scan.  I included a screen capture of the errors after a few
attempts to get it working.  Thank You.







Daniel Johns
Network Operations Director
sync-logo
----------------------------
637 1st Avenue North, Suite C
Jacksonville Beach, FL 32250
Office: 904-241-3977
Fax: 904-241-3976

daniel () synchronicitylive com

www.synchronicitylive.com
----------------------------

This e-mail is intended for the addressee shown. It contains information
that is confidential and protected from unauthorized use and disclosure. 
Any
unauthorized review, dissemination or use of this transmission or its
contents is strictly prohibited.
----------------------------






--------------------------------------------------------------------------------



_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org 


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: