Name | Modified | Size | Downloads / Week |
---|---|---|---|
maskfind.py | 2012-11-13 | 4.7 kB | |
README | 2012-06-09 | 759 Bytes | |
Totals: 2 Items | 5.5 kB | 0 |
Maskfind 1.0 22/05/2012 - James McCallum james.mccallum (at) xtra.co.nz I wrote this because I couldn't find anything that could work out a remote subnet mask which is useful during the discovery phase of a penetration test. I noticed that sometimes people were missing some of the IP addresses on a router/firewall when port scanning a host. You can do what you want with this, however it would be nice to receive a shoutout. Works out if a remote host interface has additional IP's assigned to it Run maskfind against a host before portscanning to ensure you scan everything This will give accurate results providing ICMP is enabled on the second to last hop. Host must be at least two hops away Usage: maskfind.py [-h]elp [-v]erbose destination