Clicking on the genlist menu item in Backtrack Linux opens a terminal window and outputs the genlist help menu at the top. Genlist is a Perl script written to provide an easy way to generate a list of live hosts on a network or set of networks so you can then begin analyzing those hosts. All the genlist Perl script does is call nmap with the -sP switch and parse the results so only the live IP addresses are output and as simple as it seems its a handy little tool if you do penetration testing on a regular basis. Below we describe genlist in more detail and show an example of genlist in action.
PBNJ is made ip of two commands which are scanpbnj and outputpbnj. The manpages for both scanpbnj and outputpbnj are located in collapsed tables at the bottom of this post in case you want more details. When you run scanpbnj it technically a script that runs nmap and dumps the results to a database. The scanpbnj command will store results in various database formats including CSV, MySQL, PostgreSQL, and SQLite. Once the results are stored you can pull the results from the database using outputpbnj which can output report style results in CSV format, tab delimited format, or HTML format. Continue reading below for more details regarding outputpbnj and scanpbnj on Backtrack Linux 5 r2.
Nmap 5.51: Zenmap: Error Saving Snapshot: Surface.write_to_png takes one argument which must be a filename (str)
I upgraded to Nmap 5.51 early this afternoon because a friend asked me to take a look at creating a topology image of a network scan of around 3,000 hosts. After upgrading I opened his scan in Zenmap and attempted to export the topology of the scan as a PNG but I received an error which I at first assumed was an issue on my computer or an issue with the fact that the export to PNG image was taking place on a 64-bit Windows 7 computer however both of those turned out to be incorrect. Below I describe the error in more detail as well as the current newest Nmap version that will allow PNG export, a workaround for the issue, and notes about the response from the Nmap development team that already pushed a fix to SVN only a couple hours after the issue was reported (+1 Nmap devs!).
Earlier today while working with a friend at our offices we were playing around with a large NMAP scan of the anoNet network. His computer would not open the network topology in Zenmap because of a lack of RAM so we were looking at it on another laptop with much more RAM. After discussing it for a little bit we were curious how many hosts had been discovered on anoNet but initially I didn’t see an easy way to get this information. Use the information below for a quick count of hosts in Zenmap discovered via a NMAP scan.
I have recently gotten a macbook pro to play around with so my next few articles will most likely cover getting the tools and such the way I want them on the mac book pro. The first thing I discovered is that many of the command line tools which I use every day such as nmap are available in the macports package which is a package management system similar to what I was used to in Linux.
I will details the steps I had to take to get macports installed: