[Beowulf] A careful exploit?

Jonathan Engwall engwalljonathanthereal at gmail.com
Sun Jun 9 13:41:19 PDT 2019


Hello Beowulf,
Recently we had serious trouble with the internet. A technician had to
climb the pole. Another technician, an IT specialist in Mexico City, could
not resolve the issue, sent the man here.
Now trouble is back. What does this mean? Where are the missing IPs? From
the pole to the modem, to my repeater, to my machine, and then my VM gives
this using nmap:

Starting Nmap 6.40 ( http://nmap.org ) at 2019-06-09 13:30 PDT
Initiating Ping Scan at 13:30
Scanning 256 hosts [2 ports/host]
Completed Ping Scan at 13:31, 6.64s elapsed (256 total hosts)
Initiating Parallel DNS resolution of 256 hosts. at 13:31
Completed Parallel DNS resolution of 256 hosts. at 13:31, 0.04s elapsed
Nmap scan report for 192.168.0.0 [host down]
Nmap scan report for 192.168.0.1
Host is up (0.0080s latency).
Nmap scan report for 192.168.0.2
Host is up (0.00068s latency).
Nmap scan report for 192.168.0.3 [host down]
Nmap scan report for 192.168.0.4 [host down]
Nmap scan report for 192.168.0.5
Host is up (0.063s latency).
Nmap scan report for 192.168.0.6
Host is up (0.00068s latency).
Nmap scan report for 192.168.0.7 [host down]
Nmap scan report for 192.168.0.8 [host down]
Nmap scan report for 192.168.0.9 [host down]
Nmap scan report for 192.168.0.10 [host down]
Nmap scan report for 192.168.0.11 [host down]

Is this a new exploit?
Thank you,
Jonathan Engwall
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://beowulf.org/pipermail/beowulf/attachments/20190609/8d66a9e5/attachment.html>


More information about the Beowulf mailing list