Re: Discovering network subnets

From: Kelly Scroggins (kelly@cliffhanger.com)
Date: Sat Aug 20 2005 - 19:44:04 EDT


:)

 - C O R R E C T I O N -

The last 'host' was incorrect :)

The network ID of 192.168.1.0/22 includes 4
'C Blocks' with the following hosts ...

 192.168.0.1 -to- 192.168.0.255
 192.168.1.0 -to- 192.168.1.255
 192.168.2.0 -to- 192.168.2.255
 192.168.3.0 -to- 192.168.3.254 <--- was .255
        

-- 
	   --    -- 
	     \  /
	      \/
	      /\
	     /  \
	   --    --
Quoting Kelly Scroggins <kelly@cliffhanger.com>:
        Depending on the netmask used, it could be a valid
        host IP.  i.e.,
        
        The network ID of 192.168.1.0/22 includes 4 
        'C Blocks' with the following hosts ...
        
         192.168.0.1 -to- 192.168.0.255
         192.168.1.0 -to- 192.168.1.255
         192.168.2.0 -to- 192.168.2.255
         192.168.3.0 -to- 192.168.3.255
        
        -- 
        
        	   --    -- 
        	     \  /
        	      \/
        	      /\
        	     /  \
        	   --    --
        
        
        
        Quoting hannibal blog <hannibalsec@gmail.com>:
                hello list
                
                I'm actually doing a blackbox audit of a network, and I'm trying to
                discover network architecture.
                
                I got this output with nmap X.X.X.0/24
                
                interresting ports on X.X.X.0 
                68/tcp
                723/tcp
                6000/tcp
                
                I'm not sure the network is a C class one, but I'm surprised that such
                an ip adress is an host IP.
                What do u think ?
                Any idea to guess network adressing map ?
                
                ------------------------------------------------------------------------------
                FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't
                
                Learn the hacker's secrets that compromise wireless LANs. Secure your
                WLAN by understanding these threats, available hacking tools and proven
                countermeasures. Defend your WLAN against man-in-the-Middle attacks and
                session hijacking, denial-of-service, rogue access points, identity
                thefts and MAC spoofing. Request your complimentary white paper at:
                
                http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801
                -------------------------------------------------------------------------------
                
------------------------------------------------------------------------------
FREE WHITE PAPER - Wireless LAN Security: What Hackers Know That You Don't
Learn the hacker's secrets that compromise wireless LANs. Secure your
WLAN by understanding these threats, available hacking tools and proven
countermeasures. Defend your WLAN against man-in-the-Middle attacks and
session hijacking, denial-of-service, rogue access points, identity
thefts and MAC spoofing. Request your complimentary white paper at:
http://www.securityfocus.com/sponsor/AirDefense_pen-test_050801
-------------------------------------------------------------------------------


This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:46 EDT