This doesn't make sense: localhost:~ # nmap -sP 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 20:11 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.30 seconds It should have at least found the Epson printer and the router. I was hoping it would find the old HP printer, so I would know what its IP is. --doug
On 04/08/2021 02.21, Douglas McGarrett wrote:
This doesn't make sense:
localhost:~ # nmap -sP 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 20:11 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.30 seconds
It should have at least found the Epson printer and the router. I was hoping it would find the old HP printer, so I would know what its IP is.
Not really. With the options you used, it will only find them if they respond to ping. try: nmap -n 192.168.1.* -- Cheers / Saludos, Carlos E. R. (from oS Leap 15.2 x86_64 (Minas Tirith))
On 04/08/2021 02.47, Carlos E. R. wrote:
On 04/08/2021 02.21, Douglas McGarrett wrote:
This doesn't make sense:
localhost:~ # nmap -sP 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 20:11 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.30 seconds
It should have at least found the Epson printer and the router. I was hoping it would find the old HP printer, so I would know what its IP is.
Not really. With the options you used, it will only find them if they respond to ping.
try:
nmap -n 192.168.1.*
To find a networked hp printer, you probably want to do: nmap -p 9100 -n 192.168.1.* -- Cheers / Saludos, Carlos E. R. (from oS Leap 15.2 x86_64 (Minas Tirith))
Doug, Try this, ok this is the correct syntax nmap -sP -p 9100 192.168.1-254 You have define a range nmap -sP 10.0.0.0/8 I never see a wild character used successful. Pup On Tue, Aug 3, 2021 at 10:02 PM Carlos E. R. <robin.listas@telefonica.net> wrote:
On 04/08/2021 02.47, Carlos E. R. wrote:
On 04/08/2021 02.21, Douglas McGarrett wrote:
This doesn't make sense:
localhost:~ # nmap -sP 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 20:11 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.30 seconds
It should have at least found the Epson printer and the router. I was hoping it would find the old HP printer, so I would know what its IP is.
Not really. With the options you used, it will only find them if they respond to ping.
try:
nmap -n 192.168.1.*
To find a networked hp printer, you probably want to do:
nmap -p 9100 -n 192.168.1.*
-- Cheers / Saludos,
Carlos E. R.
(from oS Leap 15.2 x86_64 (Minas Tirith))
-- Terror PUP a.k.a Chuck "PUP" Payne ----------------------------------------- Discover it! Enjoy it! Share it! openSUSE Linux. ----------------------------------------- openSUSE -- Terrorpup openSUSE Ambassador/openSUSE Member skype,twiiter,identica,friendfeed -- terrorpup freenode(irc) --terrorpup/lupinstein Register Linux Userid: 155363 openSUSE Community Member since 2008.
On 2021-08-04 04:31, Chuck Payne wrote:
Try this, ok this is the correct syntax
nmap -sP -p 9100 192.168.1-254
You probably missed a "1" in the third tuple. nmap -sP -p 9100 192.168.1.1-254 or nmap -sP -p 9100 192.168.1.0/24 If you meant to do permutation of the third tuple it would be: nmap -sP -p 9100 192.168.0-255.0/24 -- /bengan
On 8/4/21 3:14 AM, Bengt Gördén wrote:
On 2021-08-04 04:31, Chuck Payne wrote:
Try this, ok this is the correct syntax
nmap -sP -p 9100 192.168.1-254
You probably missed a "1" in the third tuple.
nmap -sP -p 9100 192.168.1.1-254 or nmap -sP -p 9100 192.168.1.0/24
If you meant to do permutation of the third tuple it would be: nmap -sP -p 9100 192.168.0-255.0/24
As I mentioned in one reply, there is something not kosher about this computer: it cannot deal with bash (UNIX) commands. I am trying to get thru to the people who sold it to me. Meanwhile, running the code on the half-working laptop gives me the ip and the MAC address of the printer. How to use this information to get thru to it from Leap, I don't know. Thanx for your contribution--doug
Damn, Yes, I might to type 192.168.1.1-254 and 192.168.1.0/24, can't believe I didn't catch that. I also fort that this is useful as well nmap -sP -p 22 --open 192.168.1.1-254 I use that when I am looking for a new headless pi so I can log in, it will only show hosts that have the port open you are looking for, save time. Pup On Wed, Aug 4, 2021 at 3:15 AM Bengt Gördén <bengan@bag.org> wrote:
On 2021-08-04 04:31, Chuck Payne wrote:
Try this, ok this is the correct syntax
nmap -sP -p 9100 192.168.1-254
You probably missed a "1" in the third tuple.
nmap -sP -p 9100 192.168.1.1-254 or nmap -sP -p 9100 192.168.1.0/24
If you meant to do permutation of the third tuple it would be: nmap -sP -p 9100 192.168.0-255.0/24
-- /bengan
-- Terror PUP a.k.a Chuck "PUP" Payne ----------------------------------------- Discover it! Enjoy it! Share it! openSUSE Linux. ----------------------------------------- openSUSE -- Terrorpup openSUSE Ambassador/openSUSE Member skype,twiiter,identica,friendfeed -- terrorpup freenode(irc) --terrorpup/lupinstein Register Linux Userid: 155363 openSUSE Community Member since 2008.
On 04/08/2021 04.31, Chuck Payne wrote:
Doug,
Try this, ok this is the correct syntax
nmap -sP -p 9100 192.168.1-254
You have define a range
nmap -sP 10.0.0.0/8 <http://10.0.0.0/8>
I never see a wild character used successful.
I tried the command here before posting, worked fine. minas-tirith:/etc/cups # time nmap -p 9100 -n 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-04 03:57 CEST Nmap scan report for 192.168.1.1 Host is up (0.0049s latency). PORT STATE SERVICE 9100/tcp filtered jetdirect MAC Address: 00:8E:F2:F5:1C:13 (Netgear) Nmap scan report for 192.168.1.3 Host is up (0.21s latency). PORT STATE SERVICE 9100/tcp closed jetdirect MAC Address: 5C:51:88:8F:3B:18 (Motorola Mobility, a Lenovo Company) Nmap scan report for 192.168.1.8 Host is up (0.22s latency). PORT STATE SERVICE 9100/tcp closed jetdirect MAC Address: 38:80:DF:5C:75:B5 (Unknown) Nmap scan report for 192.168.1.201 Host is up (0.0030s latency). PORT STATE SERVICE 9100/tcp closed jetdirect MAC Address: 64:68:0C:74:E7:06 (Comtrend) Nmap scan report for 192.168.1.9 Host is up (0.000076s latency). PORT STATE SERVICE 9100/tcp closed jetdirect Nmap done: 256 IP addresses (5 hosts up) scanned in 8.81 seconds real 0m8.955s user 0m0.215s sys 0m0.049s minas-tirith:/etc/cups # -- Cheers / Saludos, Carlos E. R. (from oS Leap 15.2 x86_64 (Minas Tirith))
On 8/3/21 8:47 PM, Carlos E. R. wrote:
On 04/08/2021 02.21, Douglas McGarrett wrote:
This doesn't make sense:
localhost:~ # nmap -sP 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 20:11 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.30 seconds
It should have at least found the Epson printer and the router. I was hoping it would find the old HP printer, so I would know what its IP is. Not really. With the options you used, it will only find them if they respond to ping.
try:
nmap -n 192.168.1.*
Just made a discouraging discovery. Apparently the Dell Optiplex 780 has got some kind of nanny program built into it. Not only wouldn't it run nmap, it wouldn't even run ping! My only partially functioning laptop--also Dell, BTW--ran both. I had to sneaker-net the results over here: [doug@doug@dell1 ~]$ su - Password: [root@doug@dell1 ~]# ping 192.168.1.26 PING 192.168.1.26 (192.168.1.26) 56(84) bytes of data. 64 bytes from 192.168.1.26: icmp_req=1 ttl=64 time=0.489 ms 64 bytes from 192.168.1.26: icmp_req=2 ttl=64 time=0.249 ms (extra replies deleted) --- 192.168.1.26 ping statistics --- 4 packets transmitted, 4 received, 0% packet loss, time 3000ms rtt min/avg/max/mdev = 0.242/0.306/0.489/0.105 ms [root@doug@dell1 ~]# nmap -sP 192.168.1.* Starting Nmap 7.12 ( https://nmap.org ) at 2021-08-03 17:53 EDT Nmap scan report for 192.168.1.26 Host is up (0.00026s latency). MAC Address: A4:EE:57:73:CB:85 (Seiko Epson) Nmap scan report for 192.168.1.27 Host is up (0.00094s latency). MAC Address: 00:0E:7F:E3:77:B7 (Hewlett Packard) Nmap scan report for 192.168.1.10 Host is up. Nmap done: 256 IP addresses (3 hosts up) scanned in 33.71 seconds -26 is the Epson printer, -27 is the only HP on the lan right now, so it must be the LaserJet. (Also, nothing here was ever assigned the -27 label. -10 is the laptop.(Both the laptop and the printer have fixed ip addresses.) --doug
On 2021-08-03 11:58 p.m., Douglas McGarrett wrote:
Apparently the Dell Optiplex 780 has got some kind of nanny program built into it. Not only wouldn't it run nmap, it wouldn't even run ping!
WTF??? If you install Linux on that computer, where is that nanny program running? I've never heard of a computer or anything else blocking ping, as it's a useful tool that's often necessary to resolve problems. What happens if you make a bootable USB stick and use it to ping or nmap?
On 8/4/21 8:53 AM, James Knott wrote:
On 2021-08-03 11:58 p.m., Douglas McGarrett wrote:
Apparently the Dell Optiplex 780 has got some kind of nanny program built into it. Not only wouldn't it run nmap, it wouldn't even run ping!
WTF???
If you install Linux on that computer, where is that nanny program running? I've never heard of a computer or anything else blocking ping, as it's a useful tool that's often necessary to resolve problems. What happens if you make a bootable USB stick and use it to ping or nmap? Well, the Linux code is running off the hard drive. A SMALL hard drive, AAMOF. Beware Discount Electronics.com. I suspect that the problem is hard coded in the BIOS, but I'm not an expert. I don't really care if it will work on a USB stick. If I can't get it fixed I'm going to send it back and make a big stink on the Internet about the situation! --doug
On 2021-08-04 4:07 p.m., Douglas McGarrett wrote:
On 8/4/21 8:53 AM, James Knott wrote:
On 2021-08-03 11:58 p.m., Douglas McGarrett wrote:
Apparently the Dell Optiplex 780 has got some kind of nanny program built into it. Not only wouldn't it run nmap, it wouldn't even run ping!
WTF???
If you install Linux on that computer, where is that nanny program running? I've never heard of a computer or anything else blocking ping, as it's a useful tool that's often necessary to resolve problems. What happens if you make a bootable USB stick and use it to ping or nmap? Well, the Linux code is running off the hard drive. A SMALL hard drive, AAMOF. Beware Discount Electronics.com. I suspect that the problem is hard coded in the BIOS, but I'm not an expert. I don't really care if it will work on a USB stick. If I can't get it fixed I'm going to send it back and make a big stink on the Internet about the situation! --doug
What happens if you enter this command? ping 127.0.0.1 Next, ping your IP address. What happens? Then your gateway address?
On 8/3/21 8:47 PM, Carlos E. R. wrote:
On 04/08/2021 02.21, Douglas McGarrett wrote:
This doesn't make sense:
localhost:~ # nmap -sP 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 20:11 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.30 seconds
It should have at least found the Epson printer and the router. I was hoping it would find the old HP printer, so I would know what its IP is. Not really. With the options you used, it will only find them if they respond to ping.
try:
nmap -n 192.168.1.*
That's no help either. localhost:~ # nmap -n 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 21:45 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.33 seconds A separate message indicated that the Dell Optiplex 780 rejects the results of commands ping and nmap. I wonder if anyone reading this knows how to defeat this "feature?" Unknown is what else has been disabled. I also noted when I received it that it has the capability to install a padlock so that the side cannot be removed. (It didn't come with the padlock!) --doug
On 04/08/2021 06.08, Douglas McGarrett wrote:
On 8/3/21 8:47 PM, Carlos E. R. wrote:
On 04/08/2021 02.21, Douglas McGarrett wrote:
This doesn't make sense:
localhost:~ # nmap -sP 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 20:11 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.30 seconds
It should have at least found the Epson printer and the router. I was hoping it would find the old HP printer, so I would know what its IP is. Not really. With the options you used, it will only find them if they respond to ping.
try:
nmap -n 192.168.1.*
That's no help either.
localhost:~ # nmap -n 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 21:45 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.33 seconds
And the rest of the text? Surely it doesn't stop suddenly, it prints pages of text. Copy it ALL here.
A separate message indicated that the Dell Optiplex 780 rejects the results of commands ping and nmap. I wonder if anyone reading this knows how to defeat this "feature?"
This is ridiculous. What is this Dell Optiplex 780? Was it affected by the thunderstorm? What operating system does it run? Who installed it? What exact symptoms do you see? -- Cheers / Saludos, Carlos E. R. (from oS Leap 15.2 x86_64 (Minas Tirith))
On Wed, 4 Aug 2021 11:05:19 +0200 "Carlos E. R." <robin.listas@telefonica.net> wrote:
On 04/08/2021 06.08, Douglas McGarrett wrote:
On 8/3/21 8:47 PM, Carlos E. R. wrote:
This doesn't make sense:
localhost:~ # nmap -sP 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 20:11 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.30 seconds
It should have at least found the Epson printer and the router. I was hoping it would find the old HP printer, so I would know what its IP is. Not really. With the options you used, it will only find them if
On 04/08/2021 02.21, Douglas McGarrett wrote: they respond to ping.
try:
nmap -n 192.168.1.*
That's no help either.
localhost:~ # nmap -n 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 21:45 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.33 seconds
No that's the full output if you scan a network with no devices on it: # nmap -sP 192.168.178.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-04 13:28 BST Nmap done: 256 IP addresses (0 hosts up) scanned in 206.22 seconds #
And the rest of the text? Surely it doesn't stop suddenly, it prints pages of text. Copy it ALL here.
A separate message indicated that the Dell Optiplex 780 rejects the results of commands ping and nmap. I wonder if anyone reading this knows how to defeat this "feature?"
This is ridiculous.
What is this Dell Optiplex 780? Was it affected by the thunderstorm? What operating system does it run? Who installed it? What exact symptoms do you see?
On 04/08/2021 14.38, Dave Howorth wrote:
On Wed, 4 Aug 2021 11:05:19 +0200 "Carlos E. R." <> wrote:
On 04/08/2021 06.08, Douglas McGarrett wrote:
On 8/3/21 8:47 PM, Carlos E. R. wrote:
This doesn't make sense:
localhost:~ # nmap -sP 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 20:11 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.30 seconds
It should have at least found the Epson printer and the router. I was hoping it would find the old HP printer, so I would know what its IP is. Not really. With the options you used, it will only find them if
On 04/08/2021 02.21, Douglas McGarrett wrote: they respond to ping.
try:
nmap -n 192.168.1.*
That's no help either.
localhost:~ # nmap -n 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 21:45 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.33 seconds
No that's the full output if you scan a network with no devices on it:
# nmap -sP 192.168.178.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-04 13:28 BST Nmap done: 256 IP addresses (0 hosts up) scanned in 206.22 seconds #
Notice that you pasted the next '#' symbol, you pasted from prompt to prompt in a single mouse sweep. That's proof. He did not post proof, and he said something impossible about a Dell computer. Where are the messages from nmap pertaining to that Dell? I want proofs about what he says of the Dell. I do not want interpretations of what is happening, what he THINKS is happening. I want the commands full output showing proof. We will then draw our own conclusions. -- Cheers / Saludos, Carlos E. R. (from oS Leap 15.2 x86_64 (Minas Tirith))
On Wed, 4 Aug 2021 15:04:09 +0200 "Carlos E. R." <robin.listas@telefonica.net> wrote:
On 04/08/2021 14.38, Dave Howorth wrote:
On Wed, 4 Aug 2021 11:05:19 +0200 "Carlos E. R." <> wrote:
On 04/08/2021 06.08, Douglas McGarrett wrote:
On 8/3/21 8:47 PM, Carlos E. R. wrote:
This doesn't make sense:
localhost:~ # nmap -sP 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 20:11 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.30 seconds
It should have at least found the Epson printer and the router. I was hoping it would find the old HP printer, so I would know what its IP is. Not really. With the options you used, it will only find them if
On 04/08/2021 02.21, Douglas McGarrett wrote: they respond to ping.
try:
nmap -n 192.168.1.*
That's no help either.
localhost:~ # nmap -n 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 21:45 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.33 seconds
No that's the full output if you scan a network with no devices on it:
# nmap -sP 192.168.178.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-04 13:28 BST Nmap done: 256 IP addresses (0 hosts up) scanned in 206.22 seconds #
Notice that you pasted the next '#' symbol, you pasted from prompt to prompt in a single mouse sweep. That's proof.
Well I know what you mean, but you're wrong actually. What it means is that I carefully edited my posting to look like that, specifically to give the impression that was what it looked like. In reality there was the name of my host before the # mark, which I edited out. So don't believe everything you see. My point was just to emphasise that what doug posted quite possibly was the complete output and not as you claimed "And the rest of the text? Surely it doesn't stop suddenly, it prints pages of text." But why nmap didn't find any hosts at all is a puzzle. Even on a network where only the gateway is visble, it prints the gateway details. It was only on a non-existent network I got that result.
He did not post proof, and he said something impossible about a Dell computer. Where are the messages from nmap pertaining to that Dell? I want proofs about what he says of the Dell.
I do not want interpretations of what is happening, what he THINKS is happening. I want the commands full output showing proof. We will then draw our own conclusions.
Yeah, you have my sympathies.
On 8/4/21 9:04 AM, Carlos E. R. wrote:
On Wed, 4 Aug 2021 11:05:19 +0200 "Carlos E. R." <> wrote:
On 04/08/2021 06.08, Douglas McGarrett wrote:
On 8/3/21 8:47 PM, Carlos E. R. wrote:
This doesn't make sense:
localhost:~ # nmap -sP 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 20:11 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.30 seconds
It should have at least found the Epson printer and the router. I was hoping it would find the old HP printer, so I would know what its IP is. Not really. With the options you used, it will only find them if
On 04/08/2021 02.21, Douglas McGarrett wrote: they respond to ping.
try:
nmap -n 192.168.1.*
That's no help either.
localhost:~ # nmap -n 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 21:45 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.33 seconds
No that's the full output if you scan a network with no devices on it:
# nmap -sP 192.168.178.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-04 13:28 BST Nmap done: 256 IP addresses (0 hosts up) scanned in 206.22 seconds # Notice that you pasted the next '#' symbol, you pasted from prompt to
On 04/08/2021 14.38, Dave Howorth wrote: prompt in a single mouse sweep. That's proof. He did not post proof, and he said something impossible about a Dell computer. Where are the messages from nmap pertaining to that Dell? I want proofs about what he says of the Dell.
I do not want interpretations of what is happening, what he THINKS is happening. I want the commands full output showing proof. We will then draw our own conclusions.
18 2021-08-03 20:10:31 nmap -sP 192.168.1.* 19 2021-08-03 20:11:06 cnf nmap 20 2021-08-03 20:11:20 zypper install nmap 21 2021-08-03 20:11:55 nmap -sP 192.168.1.* 22 2021-08-03 21:45:17 nmap -n 192.168.1.* 23 2021-08-03 21:50:49 ping 192.168.1.26 24 2021-08-04 15:10:08 64 bytes from 192.168.1.26: icmp_req=3 ttl=64 time=0.244 ms 25 2021-08-04 15:10:08 64 bytes from 192.168.1.26: icmp_req=4 ttl=64 time=0.242 ms 26 2021-08-04 15:11:27 nmap -sP -p 9100 192.168.1.1-254 27 2021-08-04 15:13:46 nmap -sP -p 9100 192.168.1.0/24 28 2021-08-04 15:14:26 nmap -sP -p 9100 192.168.0-255.0/24 29 2021-08-04 16:09:14 ping 30 2021-08-04 16:10:52 history As you see, it does not respond to the commands. (I was surprised that OpenSUSE does not have nmap as a normal function, and I had to install it, as you can also see. 192.168.1.26 is my Epson printer, with a static IP, and appears without problems when pinged from the partially-working laptop. Unfortunately, the damaged laptop cannot access the internet, so I cannot send you a download from it, unless I copy it and snail-mail it and send it from here. --doug
On 04/08/2021 22.18, Douglas McGarrett wrote:
On 8/4/21 9:04 AM, Carlos E. R. wrote:
On 04/08/2021 14.38, Dave Howorth wrote:
On Wed, 4 Aug 2021 11:05:19 +0200 "Carlos E. R." <> wrote:
18 2021-08-03 20:10:31 nmap -sP 192.168.1.* 19 2021-08-03 20:11:06 cnf nmap 20 2021-08-03 20:11:20 zypper install nmap 21 2021-08-03 20:11:55 nmap -sP 192.168.1.* 22 2021-08-03 21:45:17 nmap -n 192.168.1.* 23 2021-08-03 21:50:49 ping 192.168.1.26 24 2021-08-04 15:10:08 64 bytes from 192.168.1.26: icmp_req=3 ttl=64 time=0.244 ms 25 2021-08-04 15:10:08 64 bytes from 192.168.1.26: icmp_req=4 ttl=64 time=0.242 ms 26 2021-08-04 15:11:27 nmap -sP -p 9100 192.168.1.1-254 27 2021-08-04 15:13:46 nmap -sP -p 9100 192.168.1.0/24 28 2021-08-04 15:14:26 nmap -sP -p 9100 192.168.0-255.0/24 29 2021-08-04 16:09:14 ping 30 2021-08-04 16:10:52 history
This is not Linux. Please have a technician install Linux for you. I can not help you. -- Cheers / Saludos, Carlos E. R. (from oS Leap 15.2 x86_64 (Minas Tirith))
On 8/4/21 4:32 PM, Carlos E. R. wrote:
On 04/08/2021 22.18, Douglas McGarrett wrote:
On 8/4/21 9:04 AM, Carlos E. R. wrote:
On 04/08/2021 14.38, Dave Howorth wrote:
On Wed, 4 Aug 2021 11:05:19 +0200 "Carlos E. R." <> wrote:
18 2021-08-03 20:10:31 nmap -sP 192.168.1.* 19 2021-08-03 20:11:06 cnf nmap 20 2021-08-03 20:11:20 zypper install nmap 21 2021-08-03 20:11:55 nmap -sP 192.168.1.* 22 2021-08-03 21:45:17 nmap -n 192.168.1.* 23 2021-08-03 21:50:49 ping 192.168.1.26 24 2021-08-04 15:10:08 64 bytes from 192.168.1.26: icmp_req=3 ttl=64 time=0.244 ms 25 2021-08-04 15:10:08 64 bytes from 192.168.1.26: icmp_req=4 ttl=64 time=0.242 ms 26 2021-08-04 15:11:27 nmap -sP -p 9100 192.168.1.1-254 27 2021-08-04 15:13:46 nmap -sP -p 9100 192.168.1.0/24 28 2021-08-04 15:14:26 nmap -sP -p 9100 192.168.0-255.0/24 29 2021-08-04 16:09:14 ping 30 2021-08-04 16:10:52 history
This is not Linux.
Please have a technician install Linux for you.
I can not help you.
That is PCLinuxOS from about 2015 or so. That's what's on the laptop. --doug
On 04/08/2021 23.42, Douglas McGarrett wrote:
On 8/4/21 4:32 PM, Carlos E. R. wrote:
On 04/08/2021 22.18, Douglas McGarrett wrote:
On 8/4/21 9:04 AM, Carlos E. R. wrote:
On 04/08/2021 14.38, Dave Howorth wrote:
On Wed, 4 Aug 2021 11:05:19 +0200 "Carlos E. R." <> wrote:
18 2021-08-03 20:10:31 nmap -sP 192.168.1.* 19 2021-08-03 20:11:06 cnf nmap 20 2021-08-03 20:11:20 zypper install nmap 21 2021-08-03 20:11:55 nmap -sP 192.168.1.* 22 2021-08-03 21:45:17 nmap -n 192.168.1.* 23 2021-08-03 21:50:49 ping 192.168.1.26 24 2021-08-04 15:10:08 64 bytes from 192.168.1.26: icmp_req=3 ttl=64 time=0.244 ms 25 2021-08-04 15:10:08 64 bytes from 192.168.1.26: icmp_req=4 ttl=64 time=0.242 ms 26 2021-08-04 15:11:27 nmap -sP -p 9100 192.168.1.1-254 27 2021-08-04 15:13:46 nmap -sP -p 9100 192.168.1.0/24 28 2021-08-04 15:14:26 nmap -sP -p 9100 192.168.0-255.0/24 29 2021-08-04 16:09:14 ping 30 2021-08-04 16:10:52 history
This is not Linux.
Please have a technician install Linux for you.
I can not help you.
That is PCLinuxOS from about 2015 or so. That's what's on the laptop.
So, not the Dell Optiplex 780 with the nanny watcher. Now it is the laptop, which you said was damaged by thunderstroke. And we have to understand commands issued on it? Sigh... -- Cheers / Saludos, Carlos E. R. (from oS Leap 15.2 x86_64 (Minas Tirith))
On 04/08/2021 23.59, Carlos E. R. wrote:
On 04/08/2021 23.42, Douglas McGarrett wrote:
On 8/4/21 4:32 PM, Carlos E. R. wrote:
On 04/08/2021 22.18, Douglas McGarrett wrote:
On 8/4/21 9:04 AM, Carlos E. R. wrote:
On 04/08/2021 14.38, Dave Howorth wrote:
On Wed, 4 Aug 2021 11:05:19 +0200 "Carlos E. R." <> wrote:
18 2021-08-03 20:10:31 nmap -sP 192.168.1.* 19 2021-08-03 20:11:06 cnf nmap 20 2021-08-03 20:11:20 zypper install nmap 21 2021-08-03 20:11:55 nmap -sP 192.168.1.* 22 2021-08-03 21:45:17 nmap -n 192.168.1.* 23 2021-08-03 21:50:49 ping 192.168.1.26 24 2021-08-04 15:10:08 64 bytes from 192.168.1.26: icmp_req=3 ttl=64 time=0.244 ms 25 2021-08-04 15:10:08 64 bytes from 192.168.1.26: icmp_req=4 ttl=64 time=0.242 ms 26 2021-08-04 15:11:27 nmap -sP -p 9100 192.168.1.1-254 27 2021-08-04 15:13:46 nmap -sP -p 9100 192.168.1.0/24 28 2021-08-04 15:14:26 nmap -sP -p 9100 192.168.0-255.0/24 29 2021-08-04 16:09:14 ping 30 2021-08-04 16:10:52 history
This is not Linux.
Please have a technician install Linux for you.
I can not help you.
That is PCLinuxOS from about 2015 or so. That's what's on the laptop.
So, not the Dell Optiplex 780 with the nanny watcher.
Now it is the laptop, which you said was damaged by thunderstroke. And we have to understand commands issued on it?
Oh, and you were calling up zypper on that PCLinuxOS, line 20. How on earth do you expect us to understand what is going on? -- Cheers / Saludos, Carlos E. R. (from oS Leap 15.2 x86_64 (Minas Tirith))
On Wed, 4 Aug 2021 11:05:19 +0200 "Carlos E. R." <robin.listas@telefonica.net> wrote:
On 04/08/2021 06.08, Douglas McGarrett wrote:
On 8/3/21 8:47 PM, Carlos E. R. wrote:
This doesn't make sense:
localhost:~ # nmap -sP 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 20:11 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.30 seconds
It should have at least found the Epson printer and the router. I was hoping it would find the old HP printer, so I would know what its IP is. Not really. With the options you used, it will only find them if
On 04/08/2021 02.21, Douglas McGarrett wrote: they respond to ping.
try:
nmap -n 192.168.1.*
That's no help either.
localhost:~ # nmap -n 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 21:45 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.33 seconds
No that's the full output if you scan a network with no devices on it:
# nmap -sP 192.168.178.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-04 13:28 BST Nmap done: 256 IP addresses (0 hosts up) scanned in 206.22 seconds #
And the rest of the text? Surely it doesn't stop suddenly, it prints pages of text. Copy it ALL here.
A separate message indicated that the Dell Optiplex 780 rejects the results of commands ping and nmap. I wonder if anyone reading this knows how to defeat this "feature?" This is ridiculous.
What is this Dell Optiplex 780? Was it affected by the thunderstorm? What operating system does it run? Who installed it? What exact symptoms do you see?
I bought the Dell Optiplex AFTER the lightning storm, since all the
On 8/4/21 8:38 AM, Dave Howorth wrote: three computers in the house were damaged in various ways. It apparently has some kind of nanny code in it somewhere --the BIOS?-- and it refuses to honor requests like ping or nmap, and who knows what else. It was difficult to install Linux, too. --doug
On 2021-08-04 4:02 p.m., Douglas McGarrett wrote:
It apparently has some kind of nanny code in it somewhere --the BIOS?-- and it refuses to honor requests like ping or nmap, and who knows what else.
That would require deep packet inspection, to see what a packet is supposed to do. Also, since ping is often used by help desk support, it's unlikely to be suppressed (I have done software support at IBM and elsewhere). Is the BIOS even involved in networking?
Douglas McGarrett composed on 2021-08-04 16:02 (UTC-0400): ...
On 04/08/2021 06.08, Douglas McGarrett wrote: ... What is this Dell Optiplex 780? Was it affected by the thunderstorm? What operating system does it run? Who installed it? What exact symptoms do you see?
I bought the Dell Optiplex AFTER the lightning storm, since all the three computers in the house were damaged in various ways. It apparently has some kind of nanny code in it somewhere --the BIOS?-- and it refuses to honor requests like ping or nmap, and who knows what else. It was difficult to install Linux, too.
I wouldn't be blaming the 780 for such things. I have two of them, and a 760, and a 745. All behave just like any generic/homebuilt PC. -- Evolution as taught in public schools is, like religion, based on faith, not based on science. Team OS/2 ** Reg. Linux User #211409 ** a11y rocks! Felix Miata
Douglas McGarrett composed on 2021-08-04 16:02 (UTC-0400): ...
On 04/08/2021 06.08, Douglas McGarrett wrote: ... What is this Dell Optiplex 780? Was it affected by the thunderstorm? What operating system does it run? Who installed it? What exact symptoms do you see? I bought the Dell Optiplex AFTER the lightning storm, since all the three computers in the house were damaged in various ways. It apparently has some kind of nanny code in it somewhere --the BIOS?-- and it refuses to honor requests like ping or nmap, and who knows what else. It was difficult to install Linux, too.
I wouldn't be blaming the 780 for such things. I have two of them, and a 760, and a 745. All behave just like any generic/homebuilt PC. I'm sure of it. I believe that this machine was deliberately modified for its use in an office, or maybe even in some restricted area, where they wanted to make sure, if possible,
On 8/4/21 4:32 PM, Felix Miata wrote: that the machine was not tampered with. Remember the padlock capability! --doug
On 2021-08-03 8:47 p.m., Carlos E. R. wrote:
On 04/08/2021 02.21, Douglas McGarrett wrote:
This doesn't make sense:
localhost:~ # nmap -sP 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 20:11 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.30 seconds
It should have at least found the Epson printer and the router. I was hoping it would find the old HP printer, so I would know what its IP is.
Not really. With the options you used, it will only find them if they respond to ping.
That's true and there's reasons why not. My printer powers down and it takes a bit more than a ping to wake it up. -- “Reality is so complex, we must move away from dogma, whether it’s conspiracy theories or free-market,” -- James Glattfelder. http://jth.ch/jbg
On 04/08/2021 13.42, Anton Aylward wrote:
On 2021-08-03 8:47 p.m., Carlos E. R. wrote:
On 04/08/2021 02.21, Douglas McGarrett wrote:
This doesn't make sense:
localhost:~ # nmap -sP 192.168.1.* Starting Nmap 7.70 ( https://nmap.org ) at 2021-08-03 20:11 EDT Nmap done: 256 IP addresses (0 hosts up) scanned in 206.30 seconds
It should have at least found the Epson printer and the router. I was hoping it would find the old HP printer, so I would know what its IP is.
Not really. With the options you used, it will only find them if they respond to ping.
That's true and there's reasons why not. My printer powers down and it takes a bit more than a ping to wake it up.
The thing is, the nmap manual says this about -sP (emphasis mine): -sn (No port scan) *This option tells Nmap not to do a port scan after host discovery, and only print out the available hosts that responded to the host discovery probes.* This is often known as a “ping scan”, but you can also request that traceroute and NSE host scripts be run. This is by default one step more intrusive than the list scan, and can often be used for the same purposes. It allows light reconnaissance of a target network without attracting much attention. Knowing how many hosts are up is more valuable to attackers than the list provided by list scan of every single IP and host name. Systems administrators often find this option valuable as well. It can easily be used to count available machines on a network or monitor server availability. This is often called a ping sweep, and is more reliable than pinging the broadcast address because many hosts do not reply to broadcast queries. The default host discovery done with -sn consists of an ICMP echo request, TCP SYN to port 443, TCP ACK to port 80, and an ICMP timestamp request by default. When executed by an unprivileged user, only SYN packets are sent (using a connect call) to ports 80 and 443 on the target. When a privileged user tries to scan targets on a local ethernet network, ARP requests are used unless --send-ip was specified. The -sn option can be combined with any of the discovery probe types (the -P* options, excluding -Pn) for greater flexibility. If any of those probe type and port number options are used, the default probes are overridden. When strict firewalls are in place between the source host running Nmap and the target network, using those advanced techniques is recommended. Otherwise hosts could be missed when the firewall drops probes or their responses. *In previous releases of Nmap, -sn was known as -sP*. -- Cheers / Saludos, Carlos E. R. (from oS Leap 15.2 x86_64 (Minas Tirith))
participants (8)
-
Anton Aylward
-
Bengt Gördén
-
Carlos E. R.
-
Chuck Payne
-
Dave Howorth
-
Douglas McGarrett
-
Felix Miata
-
James Knott