1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-17 13:09:02 +00:00

Update refguide.xml for new default ping.

This commit is contained in:
david
2009-05-27 21:50:14 +00:00
parent 1538e21724
commit 0065d2cbb3

View File

@@ -333,19 +333,18 @@ you would expect.</para>
discovery can find those machines in a sparsely allocated sea of discovery can find those machines in a sparsely allocated sea of
IP addresses.</para> IP addresses.</para>
<para>If no host discovery options are given, Nmap <para>If no host discovery options are given, Nmap sends an ICMP
sends a TCP ACK echo request, a TCP SYN packet to port 443, and TCP ACK packet to
packet destined for port 80 and an ICMP echo request query port 80, and an ICMP timestamp request. These defaults are
to each target machine. An exception to this is that an ARP scan is equivalent to the <option>-PE -PS443 -PA80 -PP</option> options.
used for any targets which are on a local ethernet network. An exception to this is that an ARP scan is used for any targets
For unprivileged Unix shell users, a SYN packet is sent which are on a local ethernet network. For unprivileged Unix shell
instead of the ACK using the <function>connect</function> users, the default probes are a SYN packet to ports 80 and 443 using
system call.<indexterm><primary>unprivileged users</primary><secondary>limitations of</secondary></indexterm> the <function>connect</function> system
These defaults are equivalent to the call.<indexterm><primary>unprivileged users</primary><secondary>limitations of</secondary></indexterm>
<option>-PA -PE</option> options. This host discovery is This host discovery is often sufficient when scanning local
often sufficient when scanning local networks, but a more networks, but a more comprehensive set of discovery probes is
comprehensive set of discovery probes is recommended for recommended for security auditing.</para>
security auditing.</para>
<para>The <option>-P*</option> options (which select <para>The <option>-P*</option> options (which select
ping types) can be combined. You can increase your odds of ping types) can be combined. You can increase your odds of
@@ -427,9 +426,10 @@ you would expect.</para>
reply to broadcast queries.</para> reply to broadcast queries.</para>
<para>The <option>-sP</option> option sends an ICMP echo <para>The <option>-sP</option> option sends an ICMP echo
request and a TCP ACK packet to port 80 by default. When request, TCP SYN to port 443, TCP ACK to port 80, and an ICMP
executed by an unprivileged user, only a SYN packet is sent timestamp request by default. When
(using a <function>connect</function> call) to port 80 on executed by an unprivileged user, only SYN packets are sent
(using a <function>connect</function> call) to ports 80 and 443 on
the target. When a privileged user tries to scan targets the target. When a privileged user tries to scan targets
on a local ethernet network, ARP requests on a local ethernet network, ARP requests
are used unless are used unless
@@ -438,7 +438,7 @@ you would expect.</para>
discovery probe types (the <option>-P*</option> options, discovery probe types (the <option>-P*</option> options,
excluding <option>-PN</option>) for greater flexibility. excluding <option>-PN</option>) for greater flexibility.
If any of those probe type and port number options are If any of those probe type and port number options are
used, the default probes (ACK and echo request) are used, the default probes are
overridden. When strict firewalls are in place between the overridden. When strict firewalls are in place between the
source host running Nmap and the target network, using source host running Nmap and the target network, using
those advanced techniques is recommended. Otherwise hosts those advanced techniques is recommended. Otherwise hosts