On 10/22/10 1:50 PM, MB Software Solutions General Account wrote:
> I run this program called IPSCAN and some users laptops show up; others
> don't.  What would prevent a user's laptop from showing up?  I'm trying to
> run SpiceWorks too (thanks for the link, Profoxers), and other users
> laptops are not showing.  I'm guessing I need to change something on their
> computer settings to allow access.

As others have stated, those "invisible" laptops are likely hidden from view 
because 
of Windows Firewall settings that are set not to respond to ICMP messages. A 
bad 
idea, IMO, but what can you do[1].

If you have access to a system that all computers on the network need to 
access, such 
as the perimeter firewall or a server or something, you can check that system's 
arp 
cache, which will give you the hardware address and the ip address of all 
recent 
network neighbors.

I'm not sure if this is available on Windows or not, but here's an example run 
right 
now on one of my perimeter firewalls (it's a Sunday, and not many people are 
working 
right now):

{{{
pmcn...@linserver:~$ arp -n
Address                  HWtype  HWaddress           Flags Mask            Iface
192.168.101.2            ether   00:0C:29:D0:06:B5   C                     eth1
192.168.101.17           ether   00:19:B9:D4:59:E2   C                     eth1
192.168.101.11           ether   00:25:64:DD:0D:9A   C                     eth1
192.168.101.105          ether   00:1D:09:D4:AE:D5   C                     eth1
192.168.101.23           ether   00:11:11:D3:7E:EA   C                     eth1
}}}

Perhaps this is good enough for your needs, if you just want to know how many 
users 
are out there. Once you have the ip address, you could use a port scanning tool 
(nmap 
for instance) to scan those ip's and find out what ports if any they are 
listening on 
and the firewall is letting through.

For instance, here's the output of me scanning one of the windows systems 
listed in 
the arp cache above:

{{{
r...@linserver:~# nmap -A 192.168.101.23

Starting Nmap 4.53 ( http://insecure.org ) at 2010-10-24 09:29 PDT
SCRIPT ENGINE: rpcinfo.nse is not a file.
SCRIPT ENGINE: Aborting script scan.
Interesting ports on c23.sanbenitoshutter.localdomain (192.168.101.23):
Not shown: 1710 closed ports
PORT     STATE SERVICE      VERSION
135/tcp  open  msrpc        Microsoft Windows RPC
139/tcp  open  netbios-ssn
445/tcp  open  microsoft-ds Microsoft Windows XP microsoft-ds
5900/tcp open  vnc          VNC (protocol 3.8)
MAC Address: 00:11:11:23:7E:EA (Intel)
Device type: general purpose
Running: Microsoft Windows XP
OS details: Microsoft Windows XP SP2
Network Distance: 1 hop
Service Info: OS: Windows

OS and Service detection performed. Please report any incorrect results at 
http://insecure.org/nmap/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 8.905 seconds
}}}


If they are completely locked down and not listening on any ports, then you 
wouldn't 
be able to identify them. I hope this is interesting and potentially helpful.

Paul


[1] You are implicitly trusting the network interface you join up with, so you 
should 
therefore have some common courtesy and respond to pings from that network 
interface.

_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/[email protected]
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to