mirror of
https://github.com/DanMcInerney/LANs.py.git
synced 2025-08-21 14:03:24 -07:00
Fixed an issue with the 'ARP' scan and rDNS
When performing the 'ARP' scan for local network members, if the \ machine's dns server has a reverse DNS entry for the router's IP \ Nmap will automatically use that instead of the router's IP in \ output. Using the '-n' flag when calling nmap avoids that issue.
This commit is contained in:
parent
6051a41718
commit
711993ba76
1 changed files with 1 additions and 1 deletions
2
LANs.py
2
LANs.py
|
@ -742,7 +742,7 @@ class active_users():
|
|||
iplist = []
|
||||
maclist = []
|
||||
try:
|
||||
nmap = Popen(['/usr/bin/nmap', '-sn', '192.168.1.*'], stdout=PIPE, stderr=DN)
|
||||
nmap = Popen(['/usr/bin/nmap', '-sn', '-n' '192.168.1.*'], stdout=PIPE, stderr=DN)
|
||||
nmap = nmap.communicate()[0]
|
||||
nmap = nmap.splitlines()[2:-1]
|
||||
except:
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue