On Mon, Jun 19, 2006 at 12:21:32PM -0800, Michael Wallette wrote:
> Sure--an nmap (http://www.insecure.org) ping scan will show this. For 
> example, on my network, I have an DHCP-addressed Iaxy that usually camps 
> out on 192.168.1.130. Running a ping scan with nmap returns the following:
> 
>    $sudo nmap -sP -v -v 192.168.1.130
>    Password:
> 
>    Starting Nmap 4.01 ( http://www.insecure.org/nmap/ ) at 2006-06-19
>    12:13 AKDT
>    Initiating ARP Ping Scan against 192.168.1.130 [1 port] at 12:13
>    The ARP Ping Scan took 0.02s to scan 1 total hosts.
>    DNS resolution of 1 IPs took 0.03s. Mode: Async [#: 3, OK: 0, NX: 1,
>    DR: 0, SF: 0, TR: 1, CN: 0]
>    Host 192.168.1.130 appears to be up.
>    MAC Address: 00:03:64:00:15:61 (Scenix Semiconductor)
>    Nmap finished: 1 IP address (1 host up) scanned in 0.758 seconds
>    Raw packets sent: 1 (42B) | Rcvd: 1 (42B)
>    $
> 
> While I don't yet have any VoIP phones on this network to test, I 
> imagine nmap would find VoIP phones, as well.
> 
> HTH!

ping(8) is known to be SUID root on most systems, and thus no need for
nmap.

But if we're into installing extra tools that need to run as root, grab
arping from your nearby distro repo.

OTOH, nmap could be used to scan the whole network:

nmap -sP 192.168.1.1-254

After which the arp table will be filled...

-- 
Tzafrir Cohen      sip:[EMAIL PROTECTED]
icq#16849755       iax:[EMAIL PROTECTED]
+972-50-7952406           
[EMAIL PROTECTED]  http://www.xorcom.com
_______________________________________________
--Bandwidth and Colocation provided by Easynews.com --

Asterisk-Users mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-users

Reply via email to