metasploit nmap VMware Fusion 5
Solution 1:
For what its worth I've seen the same issue with Fusion 6 and nmap. I also saw tcpdump fail as well:
sudo tcpdump -i vmnet8
tcpdump: vmnet8: No such device exists
(BIOCSETIF failed: Device not configured)
After upgrading libpcap to 1.40 and this still not resolving the problem, I found the following outdated post: https://communities.vmware.com/message/693833#693833
Specifically this quote is where the issue lies:
"No guarantees, but we can try to take a look at implementing BPF on Fusion's network interfaces in a future release."
This seems to point to the issue being a vmware problem, so I tried VirtualBox 4.3.0 and when using NAT at least, the issues do not occur (nmap also worked for me):
$ ifconfig
…
vboxnet0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 1500
ether 0a:00:00:00:00:00
inet 192.168.56.1 netmask 0xffffff00 broadcast 192.168.56.255
$ sudo tcpdump -i vboxnet0
tcpdump: WARNING: vboxnet0: That device doesn't support promiscuous mode
(BIOCPROMISC: Operation not supported on socket)
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on vboxnet0, link-type EN10MB (Ethernet), capture size 65535 bytes