Goal:
From my backup box on my local network, knowing the Wifi MAC address of my laptop, I would like to dynamically identify which ip address is attributed to my laptop.
The aim is to store this ip address in a local variable and that this information is retrieved by another backup script
Problem:
Calling the command nmap, as root user I want to write a script that will extract the ip address from the MAC address of my laptop.
Question:
How would you do that and with which script language?
Shell, perl, python?
Example:
from the result of nmap and with the MAC address X1:X2:3X:X4:X5:Y6, I want to extract:
Many thanks for any input!
Keep up the good work.
Cheers,
Last edited by Scrutinizer; 10-30-2014 at 05:57 AM..
Reason: code tags
Hi sir,
i want to make such programe which takes MAC(Ethernet) address of any host & give me its IP address.......
but i'm nt getting that how i can pass the MAC address to Frame........
Please give me an idea for making such program...
Thanks & regards
Krishna (3 Replies)
Hi
I need to write a bash shell script. I have two separate text files. One file contains a list of MAC addresses taken from a network scan, the other contains a list of MAC addresses for our currently-managed devices. How can I compare these two files, and output a list of addresses that have... (6 Replies)
Hi everyone.
I'm looking for a way to extract the video card properties (Name, Driver version, amount of vram). I've managed to deal with nVidia cards, but nothing came for ATI/AMD cards and other kind of chipsets. Can someone point a way to do this?
Thanks. (4 Replies)
Hi there
I lost connectivity to one of our remote systems and when I checked the messages log I found the following:
Aug 10 23:42:34 host xntpd: time reset (step) 1.681729 s
Aug 16 13:20:51 host ip: WARNING: node "mac address" is using our IP address x.x.x.x on aggr1
Aug 16 13:20:51 host... (9 Replies)
I'm having trouble getting my WIFI card to work. It's Device ID is :0c:00.0 0280: 14e4:4315 (rev 01). My OS is BT5. The card works with Lucid just fine. I've gone to the Hardware drivers to try and download it but when I try I always get this:
SystemError: installArchives()failedI've gone to... (2 Replies)
I have hp dv6 and dv7 notebook pcs on which I want to upgrade the wifi cards but when I install the new cards and boot them, the they won't even boot to the bios and they both give me the same error: "104-Unsupported wireless network device detected. System Halted. Remove device and restart." When... (1 Reply)
After installing the latest version of Kali on my Lenovo S21E laptop, I cannot access the internet.
wlan0 does not show up in ifconfig and I cannot connect to the internet.
If you need any other additional information, I will provide it. Thank you kindly. (8 Replies)
four interfaces with ifconfig
all interfaces have the same mac. If is not set for unique.
but it still works.
what difference does it make to have all macs the same or different? (4 Replies)
Hy every body,
Unfortunately and without success, i want to write a bash script who maps a known IP addess to a known MAC address using iptables and for the FORWARD chain.
Within the DHCP server, i have assigned a fixed IP address to all clients based on their MAC addresses of their... (11 Replies)
Discussion started by: hermouche
11 Replies
LEARN ABOUT DEBIAN
genlist
GENLIST.MAN.1(1p) User Contributed Perl Documentation GENLIST.MAN.1(1p)NAME
Genlist - ping scanner
SYNOPSIS
genlist [Input Type] [Scan Options] [General Options]
DESCRIPTION
Genlist is a program that returns a list of hosts that responding
to ping probes. Thus, this list can be used to perform an scan of
these machines using PBNJ or Nmap.
Apart of PBNJ 2.0 suite of tools to monitor changes on a network.
OPTIONS
Usage: genlist [Input Type] [General Options]
Input Type:
-s--scan <target> Ping Target Range ex: 10.0.0.*
Scan Options:
-n--nmap <path> Path to Nmap executable
--inter <interface> Perform scan using non default interface
General Options:
-v--version Display version
-h--help Display this information
Send Comments to Joshua D. Abraham ( jabra@ccs.neu.edu )
EXAMPLE OF GENLIST USED WITH PBNJ
$ ./genlist -s 10.0.0.* > iplist
$ sudo ./scanpbnj -i iplist
EXAMPLE OF GENLIST USED WITH NMAP
$ ./genlist -s 10.0.0.* > iplist
$ sudo ./nmap -iL iplist
INPUT TYPE -s <target> Ping Target Range ex: 10.0.0.*
The ping scan is a useful method of only scanning the host that are
responding to ICMP echo requests. This scan basically takes the host
that respond to ping and prints them. This is useful in combining
the result with a PBNJ or Nmap scan because no time is wasted in
scanning hosts that do not respond.
SCAN OPTIONS --interface <intface>
This option sets an alternative interface for performing the scan.
This is useful when you have multiple interfaces on a machine
with restrictions on which devices can access certain IP ranges.
-n --nmap <path>
Use an alternative Nmap rather than Nmap located in the your path.
This is useful if you have multiple version of Nmap installed on
a system or if you are testing a new version of Nmap. Remember that if
you are using a newly compiled version of Nmap that you need to
export NMAPDIR to the location that Nmap was compiled in. Thus, if
you have compiled Nmap in your homedir, use the following notation to
run it with Genlist:
$ export NMAPDIR=$HOME/nmap-VERSION/
$ sudo genlist -s 10.0.0.* --nmap $HOME/nmap-VERISON/
General Options:
-v --version
Prints the Genlist version number and exits.
-h --help Display this information
Prints a short help screen with the most common command flags.
Running Genlist without any arguments does the same thing.
FEATURE REQUESTS
Any feature requests should be reported to the online
feature-request-tracking system available on the web at :
http://sourceforge.net/tracker/?func=add&group_id=149390&atid=774489
Before requesting a feature, please check to see if the features has
already been requested.
BUG REPORTS
Any bugs found should be reported to the online bug-tracking system
available on the web at :
http://sourceforge.net/tracker/?func=add&group_id=149390&atid=774488.
Before reporting bugs, please check to see if the bug has already been
reported.
When reporting PBNJ bugs, it is important to include a reliable way to
reproduce the bug, version number of PBNJ and Nmap, OS
name and version, and any relevant hardware specs. And of course,
patches to rectify the bug are even better.
SEE ALSO scanpbnj(1)outputpbnj(1), nmap(1)AUTHORS
Joshua D. Abraham ( jabra@ccs.neu.edu )
LEGAL NOTICES
This program is distributed in the hope that it will be useful, but
WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
General Public License for more details at
http://www.gnu.org/copyleft/gpl.html, or in the COPYING file included
with PBNJ.
It should also be noted that PBNJ has occasionally been known to crash
poorly written applications, TCP/IP stacks, and even operating systems.
While this is extremely rare, it is important to keep in mind. PBNJ
should never be run against mission critical systems unless you are
prepared to suffer downtime. We acknowledge here that PBNJ may crash
your systems or networks and we disclaim all liability for any damage
or problems PBNJ could cause.
perl v5.8.8 2006-11-06 GENLIST.MAN.1(1p)