Penetration Testing mailing list archives

Re: Discovering network subnets


From: Kelly Scroggins <kelly () cliffhanger com>
Date: Sat, 20 Aug 2005 18:38:41 -0500

Depending on the netmask used, it could be a valid
host IP.  i.e.,

The network ID of 192.168.1.0/22 includes 4 
'C Blocks' with the following hosts ...

 192.168.0.1 -to- 192.168.0.255
 192.168.1.0 -to- 192.168.1.255
 192.168.2.0 -to- 192.168.2.255
 192.168.3.0 -to- 192.168.3.255

-- 

           --    -- 
             \  /
              \/
              /\
             /  \
           --    --



Quoting hannibal blog <hannibalsec () gmail com>:
        hello list
        
        I'm actually doing a blackbox audit of a network, and I'm trying to
        discover network architecture.
        
        I got this output with nmap X.X.X.0/24
        
        interresting ports on X.X.X.0 
        68/tcp
        723/tcp
        6000/tcp
        
        I'm not sure the network is a C class one, but I'm surprised that such
        an ip adress is an host IP.
        What do u think ?
        Any idea to guess network adressing map ?
        
        ------------------------------------------------------------------------------
        FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't
        
        Learn the hacker's secrets that compromise wireless LANs. Secure your
        WLAN by understanding these threats, available hacking tools and proven
        countermeasures. Defend your WLAN against man-in-the-Middle attacks and
        session hijacking, denial-of-service, rogue access points, identity
        thefts and MAC spoofing. Request your complimentary white paper at:
        
        http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801
        -------------------------------------------------------------------------------
        

------------------------------------------------------------------------------
FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't

Learn the hacker's secrets that compromise wireless LANs. Secure your
WLAN by understanding these threats, available hacking tools and proven
countermeasures. Defend your WLAN against man-in-the-Middle attacks and
session hijacking, denial-of-service, rogue access points, identity
thefts and MAC spoofing. Request your complimentary white paper at:

http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801
-------------------------------------------------------------------------------


Current thread: