|
arpscan
"o!{51!'
素包子博客 FFhtj(hVgc
今天看到论坛有同学想找CLI获取MAC地址的程序,挺有用的,自己搜了一把,还是有现成的,下载http://www.7747.net/Soft/201001/16987.html z> <5R|Gf
转载开始。 X C86-b)E
n;HHogA
arpscan.exe是一个基于wpcap.lib开发网络扫描工具 %sh>;^58P
所以先要安装winpcap驱动 v4Zb? Yb
它可以快速扫描网段所有存活的主机 A % Q !^d
包括安装了防火墙的主机,道理很简单,arp协议比较底层 W^,S6!
防火墙不可能过滤掉正常的arp协议请求 vq*Q.0M+
还可以快速检查整个子网里是否存在嗅探器以及使用arp欺骗技术的病毒 QZAB=rR
并精确的找到对应的ip地址及mac地址的主机 qM4c]YIaSl
程序下载:http://www.7747.net/Soft/201001/16987.html _3iHkQr
i>L+gLW
winpcap驱动 3FSqd<t;D
http://tmdnet.nothave.com/tmp/WinPcap_3_1.exe [$(%dV6O
C:\>arpscan.exe # M, 7
┏╮/╱ h!@|RW&}qX
╰★╮`, kAh>8
/╰┛ 8VG!TpX/B
===============arpscan v0.1================ ~\p]~qQ\ K
http://tmdnet.nothave.com @4d)R
code by 2007-01-07 nZ1zJpBmI
=========================================== ~9^ )w CM+
[usage:] 5 S Xn?
arpscan.exe [-options] ip1 ip2 4EI7W ,y
[options:] c5q9 LQ/
-l get the Adapter lists #?MY&hdU9
-i usage adapters id L$'[5"ma ;
-s get the sniffing host H~eRT1
-h get the host .M,RFC
example: 3<=,1 cU
arpscan.exe -i1 -h 192.168.0.1 192.168.0.254 ^m#-9- `
C:\>arpscan.exe -l f:*vr['d
1. \Device\NPF_{AE5CB855-9045-4C54-BA6E-A33D3B1B97BB} (IBM 10/100 EtherJet PCI Adapter) !f>d_RG
2. \Device\NPF_{44485286-BEC8-4019-8AAD-449233DD9AC8} (VMware Virtual Ethernet Adapter) :.(;<b<\
3. \Device\NPF_{4D5DCCEF-5C4E-42F7-BBF4-EE1DAD10223A} (VMware Virtual Ethernet Adapter) U~{du;\
C:\>arpscan.exe -i1 -h 192.168.1.1 192.168.1.254 n%h^o
Adapter id: 1 5vo.[^ty
—————————————– A,su;Q h
Description: IBM 10/100 EtherJet PCI Adapter d@w~[b
MAC Address: 00-60-94-EA-FF-DE )%rg?lI
DHCP Enabled: NO Nu8Sr]p
IP Address: 192.168.1.88 ob+euCuJ
Subnet Mask: 255.255.255.0 #T`t79*N
Gateway: 192.168.1.1 jq'!U N{
Activities Host————————– 80A.<=(=.
192.168.1.1 00-90-D0-8A-CC-CC 1+b{}d |
|