![]() To find all devices within your network, you can dump the ARP table after pinging all hosts (e.g. Unfortunately your DHCP server does not seem to report the dynamically assigned IP addresses to your name server so you cannot retrieve this information. Additionally, many DHCP clients send a host-name included in their DHCP request, so the DHCP server has a name for this device, even if that name does not appear anywhere else (DNS, SMB, …). Your DHCP server knows both of them since it has assigned the IP addresses. The only reliable information that you have about hosts in your network is that they have MAC and IP addresses. Scanning the whole port range with -p 0-65535, while generating a significant network footprint, will still not show hosts that simply don't have any open ports. Nor will any hosts that don't offer services on the ports that you scan using the -p option. Hosts that block ping probes will not appear in the output. Nmap scan report for device2.local (192.168.4.2) Nmap scan report for device1.local (192.168.4.1) Nmap -sP does reverse DNS lookups, so if your devices have reverse DNS entries, its output looks like this: > nmap -sP 192.168.4.0/24 Unfortunately I don't have access to a Raspberry Pi at the moment, so everything displayed here comes from my Debian 7 box. I think you need to be more precise about your problem, especially the definition of a device name. Nmap done: 256 IP addresses (14 hosts up) scanned in 49.30 seconds I want a list of names of all devices connected to my Wi-Fi network via the ~ $ nmap -sP 192.168.4.0/24 I can get it also on some applications so I guess it can be done in some way. I've already tried without great success many commands found on the web, but nothing worked like I wanted to.īasically, when I enter my router settings, I can get the devices' names that are connected to my net. # allow only access from a specific IP (your workstation)Įcho '$HTTP != "192.168.2.I wanted to know the names of all the devices on the network. # since running Nmap with setuid, as we are doing, is a major security risk # the following sed commands modify the file to replace deprecated nmap commands Sudo sed -i 's#/opt/local/bin/nmap#/usr/bin/nmap#' $indexfile Indexfile=/var/www/html/nmapweb/index.php You also need to change the IP address of your workstation in the lighttpd configuration!īecause copy/paste from discourse doesn't always work, you can find the script here (remember you need to execute the manual steps - download the zip file - first!) You need to check if the paths in the commands below match the actual location! If nmap isn't installed on your system yet, install it with sudo apt-get -yq install nmap -no-install-recommends (reference here). Locate nmap on your system ( which nmap). Now execute the following commands: cd /var/www/html/nmapweb You'll get some mails after you have registered and downloaded, but all of them have an unsubscribe link, so after a while, you will no longer receive their mails.įirst, create a new directory: sudo mkdir -p /var/www/html/nmapwebĪnd place the downloaded zip file in that folder. ![]() Unfortunately, the required zip file cannot be downloaded without registering.ĭownload the zip file here. This topic describes a method to run nmap in a browser. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |