$Id$ generated with razarhawk.com # Original data comes from http:// razarhawk.com # These values are known as. $Id$ generated with razarhawk.com # Original data comes from http:// razarhawk.com # These values are known as Organizationally. Users rarely modify this file, which maps MAC address prefixes to vendor names. Read on for the complete treatment. Ethernet devices, which have become the.
#!/usr/bin/perl -w use POSIX; # A simple perl script that takes a MAC address and # creates an nmap-mac-prefixes file, which is just a bunch of lines # like this . The source of this information is a file called "nmap-mac-prefixes", as discussed in Chapter 14 of the NMAP book. The upstream source is IEEE. Communication Automation 00D0DA Taicom Data Systems 00D0E8 MAC System 00D03C Vieo 00D09F Novtek Systems 00D07E Keycorp 00D0EA Nextone.
Sanitized IEEE razarhawk.com for improved network infrastructure documentation and reporting. Sanitized nmap-mac-prefixes, Arpwatch razarhawk.com and Arp-scan. Hello, i've recently found out that if there is a file /usr/local/share/nmap/nmap-mac -prefixes, there are additional infos in the captiveportal statuspage. Now, the. A similar answer to the one of LilloX, but using nMap (if installed in the system): cat `locate nmap-mac-prefixes` | grep -i ^YOUR_OID_START. I think that nmap-mac-prefixes should be updated from IEEE - the last commit seems to be missing updates in the latest IEEE razarhawk.com file.