Re: Discovering network subnets

From: Kelly Scroggins (kelly@cliffhanger.com)
Date: Sat Aug 20 2005 - 19:38:41 EDT


Depending on the netmask used, it could be a valid
host IP. i.e.,

The network ID of 192.168.1.0/22 includes 4
'C Blocks' with the following hosts ...

 192.168.0.1 -to- 192.168.0.255
 192.168.1.0 -to- 192.168.1.255
 192.168.2.0 -to- 192.168.2.255
 192.168.3.0 -to- 192.168.3.255

-- 
	   --    -- 
	     \  /
	      \/
	      /\
	     /  \
	   --    --
Quoting hannibal blog <hannibalsec@gmail.com>:
        hello list
        
        I'm actually doing a blackbox audit of a network, and I'm trying to
        discover network architecture.
        
        I got this output with nmap X.X.X.0/24
        
        interresting ports on X.X.X.0 
        68/tcp
        723/tcp
        6000/tcp
        
        I'm not sure the network is a C class one, but I'm surprised that such
        an ip adress is an host IP.
        What do u think ?
        Any idea to guess network adressing map ?
        
        ------------------------------------------------------------------------------
        FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't
        
        Learn the hacker's secrets that compromise wireless LANs. Secure your
        WLAN by understanding these threats, available hacking tools and proven
        countermeasures. Defend your WLAN against man-in-the-Middle attacks and
        session hijacking, denial-of-service, rogue access points, identity
        thefts and MAC spoofing. Request your complimentary white paper at:
        
        http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801
        -------------------------------------------------------------------------------
        
------------------------------------------------------------------------------
FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't
Learn the hacker's secrets that compromise wireless LANs. Secure your
WLAN by understanding these threats, available hacking tools and proven
countermeasures. Defend your WLAN against man-in-the-Middle attacks and
session hijacking, denial-of-service, rogue access points, identity
thefts and MAC spoofing. Request your complimentary white paper at:
http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801
-------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:46 EDT