Hi, This should work for MAC spoofing.
nmap -sS <target> --spoof-mac <MAC address> Please note the MAC address should not include hyphens. For Ex 00-0C-F1-56-98-AD, remove hyphens. On Wed, Jun 2, 2010 at 9:24 AM, nittbdb <[email protected]> wrote: > but in my opinion this tool is not gr8 tool its fake tool? > > i have been eorking on this tool forr last 4 days....but itsnot > helpful for me....... > > actually i m testing router > > my setup is:: > > > host a--------------------------------router(contains > Firewall,ips,anti-X)----------------------------host b > > I want to crash this router...........please give your valuable > suggestions................ > > i wand to find more and more bugs........... > > > > IMPORTANT QUESTION... > > If i know that the some host b port is open...then how to attack from > host A to host B throgh the router..... > > > > > On Jun 2, 8:43 am, nittbdb <[email protected]> wrote: > > i want o no how to send the spoofed mac address from nmap > > > > is it possibe? > > > > If not give me some other solution to send the spoofed mac address.. > > is there any other tool? > > > > On Jun 1, 8:59 pm, Ravi Gopal <[email protected]> wrote: > > > > > > > > > #1:*For beginners to start with here is the basics of nmap*: > > > > > =========================== > > > Syntax: nmap <Type of Scan> <options> Target > > > =========================== > > > > > *<Scan types>* > > > *Types of Scan** **Option* > > > SYN scan -sS > > > UDP scan -sU > > > TCP Scan -sT > > > ACK scan -sA > > > FIN scan -sF > > > Null scan -sN > > > XMas Scan -sX > > > > > *Note:* FIN,NULL and XMas scans are called as stealth scans. > > > There are other types of scans also like icmp Echo, ping scan, Idle > scan > > > etc. Please refer to NMAP documentation/help for more types. > > > > > *<Options>* > > > -p<port range> --> port range can be single port or multiple ports > separated > > > by commas or range of ports (EX: -p23 OR > > > -p23,25,110,3389 OR -p1-65535) > > > -sV Version --> displays the version of the service running > (Ex: IIS > > > 6.0)' > > > -O Operating System --> OS fingerprinting > > > -T(0-5) Timing option --> ideally -T4 is preferable for faster scan > with > > > optimum performance > > > -PN host discovery skip --> This option is very useful when you are > sure > > > that target is up/alive > > > > > *Target:* > > > Target can be either IP address or netmask or Website > > > > > Here are few Exaples: > > > > > *nmap -sS -O -p1-65535 192.168.0.34* > > > *nmap -sS -sV -p23,80-110,3389 192.168.0.34* > > > *nmap -sS -sV -p23 192.168.0-5.1-254* > > > > > *<< My Observations:* > > > *Nmap scan on Linux operating system is faster than the scan on windows > > > operating systems >>* > > > > > Regards, > > > Ravi Gopal > > > > > On Tue, Jun 1, 2010 at 2:37 AM, Sandeep Thakur <[email protected]> > wrote: > > > > Thanks Naik for passing us the nmap cheatsheet. Pls find the below > > > > link which is interesting and can give you little depths of how nmap > > > > works or process the commands... > > > > > > > http://haymanezzeldin.blogspot.com/2008/03/nmap-detection-and-counter... > > > > > > Regards > > > > Sandeep Thakur > > > > > > On May 31, 10:56 am, Srinivas Naik <[email protected]> wrote: > > > > > Hey, > > > > > > > Further Scans is disclosed in this attached CheatSheet. > > > > > > > Regards, > > > > > Srinivas Naik > > > > > > > On Sun, May 30, 2010 at 10:42 PM, N41K <[email protected]> > wrote: > > > > > > Hi, > > > > > > > > Shall we have discussion on NMAP, as there are many Network > Security > > > > > > Experts in our community. > > > > > > > > Lets list out what all can be discussed . > > > > > > > > Policy compliance scan > > > > > > # nmap -vv –PA80 –PE –PS23 –sS –iL input.lst --excludefile > banned.lst > > > > > > -A --osscan_limit –F –R -oA policy_check > > > > > > > > Firewall Audit > > > > > > # nmap -vv –P0 –sA –iL input.lst --excludefile banned.lst –r -n > -oA > > > > > > firewall > > > > > > > > Regards, > > > > > > 0xN41K > > > > > > > Nmap5_cheatsheet.pdf > > > > > 497KViewDownload > > > > > > -- > > > > You received this message because you are subscribed to the Google > Groups > > > > "nforceit" group. > > > > To post to this group, send an email to [email protected]. > > > > To unsubscribe from this group, send email to > > > > [email protected]<nforceit%[email protected]> > <nforceit%[email protected]om> > > > > . > > > > For more options, visit this group at > > > >http://groups.google.com/group/nforceit?hl=en-GB.-Hide quoted text - > > > > > - Show quoted text -- Hide quoted text - > > > > - Show quoted text - > > -- > You received this message because you are subscribed to the Google Groups > "nforceit" group. > To post to this group, send an email to [email protected]. > To unsubscribe from this group, send email to > [email protected]<nforceit%[email protected]> > . > For more options, visit this group at > http://groups.google.com/group/nforceit?hl=en-GB. > > -- You received this message because you are subscribed to the Google Groups "nforceit" group. To post to this group, send an email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/nforceit?hl=en-GB.
