mirror of
https://github.com/nmap/nmap.git
synced 2025-12-31 03:49:01 +00:00
Change -sP from "ping scan" to "don't port scan" in the documentation,
while still mentioning that "ping scan" is a common term. Mention the use of -PN and -sP together to run NSE host scripts without ping and port scanning.
This commit is contained in:
@@ -194,6 +194,22 @@ Nmap done: 1 IP address (1 host up) scanned in 0.33 seconds
|
||||
are generally only used for script debugging and development. Script scanning is also included as part of the <option>-A</option> (aggressive scan) option.
|
||||
</para>
|
||||
|
||||
<para>
|
||||
Script scanning is normally done in combination with a port scan,
|
||||
because scripts may be run or not run depending on the port states
|
||||
found by the scan. With the <option>-sP</option> option it is
|
||||
possible to run a script scan without a port scan, only host
|
||||
discovery. In this case only host scripts will be eligible to run.
|
||||
To run a script scan with neither a host discovery nor a port scan,
|
||||
use the <option>-PN -sP</option> options together with
|
||||
<option>-sC</option> or <option>--script</option>. Every host will
|
||||
be assumed up and still only host scripts will be run. This
|
||||
technique is useful for scripts like
|
||||
<filename>whois.nse</filename><indexterm><primary><filename>whois.nse</filename></primary></indexterm>
|
||||
that only use the remote system's address and don't require it to be
|
||||
up.
|
||||
</para>
|
||||
|
||||
<para>
|
||||
Scripts are not run in a sandbox and thus could accidentally or
|
||||
maliciously damage your system or invade your privacy. Never run
|
||||
@@ -766,6 +782,21 @@ local username = nmap.registry.args.user
|
||||
scripts.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><command>nmap -sP -sC example.com</command></term>
|
||||
<listitem>
|
||||
<para>A script scan without a port scan; only host scripts are
|
||||
eligible to run.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<term><command>nmap -PN -sP -sC example.com</command></term>
|
||||
<listitem>
|
||||
<para>A script scan without host discovery or a port scan. All
|
||||
hosts are assumed up and only host scripts are eligible to
|
||||
run.</para>
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
<varlistentry>
|
||||
<indexterm><primary><option>--script-trace</option></primary><secondary>example of</secondary></indexterm>
|
||||
<term><command>nmap --script smb-os-discovery --script-trace example.com</command></term>
|
||||
|
||||
Reference in New Issue
Block a user