Local: ifconfigRemote: nmap -sn 192.168.1.1/24 or whatever your subnet is.
Thank you but since the dhcp is turned off,the static ip range is known only to the person that configured it,nmap won't work in this scenario
Are you trying to hack a WPA/WPA2 network?
I think he already got the key, but still can't get an IP address into that subnet.
Assuming you've cracked the WPA network using a dictionary, you may have seen clients connected to the network while capturing the handshake. If you know the MAC of any client that conencts to the network, you could spoof yours to that addresss with macchanger and you'd get their IP address (although their PC may warn them someone else is using their IP or tell them they're victims of ARP poisoning).
Be careful with that, and best of luck :)
Already cracked the pin,part of the security measure put in place by the owner is turning off dhcp which means I can not connect if I don't know the ip range
note:he already changed the default ip address
Class A: 10.0.0.0 - 10.255.255.255Class B: 172.16.0.0 - 172.31.255.255Class C: 192.168.0.0 - 192.168.255.255
192.168.1.1/24 is common, 10.0.1.1/24 (I think) is second most common, and 188.8.131.52/24 is the least common.
Read this and this. You really can only manually run through these unless you want to make a script.
The average raindrop falls at 7 miles per hour. Rats and horses can't vomit. Netherlands is the only country with a national dog. About seven million cars are junked each year in the U.S. Camel's milk does not curdle. American Airlines saved $40,000 in 1987 by eliminating one olive from each salad served in first class.
Thank you kitten & cracker hacker