diff --git a/docs/refguide.xml b/docs/refguide.xml index 15aa66d24..91d7faf89 100644 --- a/docs/refguide.xml +++ b/docs/refguide.xml @@ -333,19 +333,18 @@ you would expect. discovery can find those machines in a sparsely allocated sea of IP addresses. - If no host discovery options are given, Nmap - sends a TCP ACK - packet destined for port 80 and an ICMP echo request query - to each target machine. An exception to this is that an ARP scan is - used for any targets which are on a local ethernet network. - For unprivileged Unix shell users, a SYN packet is sent - instead of the ACK using the connect - system call.unprivileged userslimitations of - These defaults are equivalent to the - options. This host discovery is - often sufficient when scanning local networks, but a more - comprehensive set of discovery probes is recommended for - security auditing. + If no host discovery options are given, Nmap sends an ICMP + echo request, a TCP SYN packet to port 443, and TCP ACK packet to + port 80, and an ICMP timestamp request. These defaults are + equivalent to the options. + An exception to this is that an ARP scan is used for any targets + which are on a local ethernet network. For unprivileged Unix shell + users, the default probes are a SYN packet to ports 80 and 443 using + the connect system + call.unprivileged userslimitations of + This host discovery is often sufficient when scanning local + networks, but a more comprehensive set of discovery probes is + recommended for security auditing. The options (which select ping types) can be combined. You can increase your odds of @@ -427,9 +426,10 @@ you would expect. reply to broadcast queries. The option sends an ICMP echo - request and a TCP ACK packet to port 80 by default. When - executed by an unprivileged user, only a SYN packet is sent - (using a connect call) to port 80 on + request, TCP SYN to port 443, TCP ACK to port 80, and an ICMP + timestamp request by default. When + executed by an unprivileged user, only SYN packets are sent + (using a connect call) to ports 80 and 443 on the target. When a privileged user tries to scan targets on a local ethernet network, ARP requests are used unless @@ -438,7 +438,7 @@ you would expect. discovery probe types (the options, excluding ) for greater flexibility. If any of those probe type and port number options are - used, the default probes (ACK and echo request) are + used, the default probes are overridden. When strict firewalls are in place between the source host running Nmap and the target network, using those advanced techniques is recommended. Otherwise hosts