From 711993ba76f8ed014f55b91a495a7ed95541aee3 Mon Sep 17 00:00:00 2001 From: Thomaso Date: Sun, 10 Nov 2013 21:18:37 -0800 Subject: [PATCH] Fixed an issue with the 'ARP' scan and rDNS When performing the 'ARP' scan for local network members, if the \ machine's dns server has a reverse DNS entry for the router's IP \ Nmap will automatically use that instead of the router's IP in \ output. Using the '-n' flag when calling nmap avoids that issue. --- LANs.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/LANs.py b/LANs.py index b324ec0..690a876 100755 --- a/LANs.py +++ b/LANs.py @@ -742,7 +742,7 @@ class active_users(): iplist = [] maclist = [] try: - nmap = Popen(['/usr/bin/nmap', '-sn', '192.168.1.*'], stdout=PIPE, stderr=DN) + nmap = Popen(['/usr/bin/nmap', '-sn', '-n' '192.168.1.*'], stdout=PIPE, stderr=DN) nmap = nmap.communicate()[0] nmap = nmap.splitlines()[2:-1] except: