diff --git a/docs/refguide.xml b/docs/refguide.xml
index 15aa66d24..91d7faf89 100644
--- a/docs/refguide.xml
+++ b/docs/refguide.xml
@@ -333,19 +333,18 @@ you would expect.
discovery can find those machines in a sparsely allocated sea of
IP addresses.
- If no host discovery options are given, Nmap
- sends a TCP ACK
- packet destined for port 80 and an ICMP echo request query
- to each target machine. An exception to this is that an ARP scan is
- used for any targets which are on a local ethernet network.
- For unprivileged Unix shell users, a SYN packet is sent
- instead of the ACK using the connect
- system call.unprivileged userslimitations of
- These defaults are equivalent to the
- options. This host discovery is
- often sufficient when scanning local networks, but a more
- comprehensive set of discovery probes is recommended for
- security auditing.
+ If no host discovery options are given, Nmap sends an ICMP
+ echo request, a TCP SYN packet to port 443, and TCP ACK packet to
+ port 80, and an ICMP timestamp request. These defaults are
+ equivalent to the options.
+ An exception to this is that an ARP scan is used for any targets
+ which are on a local ethernet network. For unprivileged Unix shell
+ users, the default probes are a SYN packet to ports 80 and 443 using
+ the connect system
+ call.unprivileged userslimitations of
+ This host discovery is often sufficient when scanning local
+ networks, but a more comprehensive set of discovery probes is
+ recommended for security auditing.The options (which select
ping types) can be combined. You can increase your odds of
@@ -427,9 +426,10 @@ you would expect.
reply to broadcast queries.
The option sends an ICMP echo
- request and a TCP ACK packet to port 80 by default. When
- executed by an unprivileged user, only a SYN packet is sent
- (using a connect call) to port 80 on
+ request, TCP SYN to port 443, TCP ACK to port 80, and an ICMP
+ timestamp request by default. When
+ executed by an unprivileged user, only SYN packets are sent
+ (using a connect call) to ports 80 and 443 on
the target. When a privileged user tries to scan targets
on a local ethernet network, ARP requests
are used unless
@@ -438,7 +438,7 @@ you would expect.
discovery probe types (the options,
excluding ) for greater flexibility.
If any of those probe type and port number options are
- used, the default probes (ACK and echo request) are
+ used, the default probes are
overridden. When strict firewalls are in place between the
source host running Nmap and the target network, using
those advanced techniques is recommended. Otherwise hosts