Fixed an issue with the 'ARP' scan and rDNS

When performing the 'ARP' scan for local network members, if the \
machine's dns server has a reverse DNS entry for the router's IP \
Nmap will automatically use that instead of the router's IP in \
output. Using the '-n' flag when calling nmap avoids that issue.
This commit is contained in:
Thomaso 2013-11-10 21:18:37 -08:00
commit 711993ba76

View file

@ -742,7 +742,7 @@ class active_users():
iplist = []
maclist = []
try:
nmap = Popen(['/usr/bin/nmap', '-sn', '192.168.1.*'], stdout=PIPE, stderr=DN)
nmap = Popen(['/usr/bin/nmap', '-sn', '-n' '192.168.1.*'], stdout=PIPE, stderr=DN)
nmap = nmap.communicate()[0]
nmap = nmap.splitlines()[2:-1]
except: