1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-22 07:29:01 +00:00

IPID -> IP ID; admin -> administrator

This commit is contained in:
fyodor
2007-09-09 02:38:20 +00:00
parent ad74d5a4b0
commit 08b0f262de

View File

@@ -632,7 +632,7 @@ you would expect.</para>
<option>-PP</option> and <option>-PM</option> options, <option>-PP</option> and <option>-PM</option> options,
respectively. A timestamp reply (ICMP code 14) or address respectively. A timestamp reply (ICMP code 14) or address
mask reply (code 18) discloses that the host is available. mask reply (code 18) discloses that the host is available.
These two queries can be valuable when admins specifically These two queries can be valuable when administrators specifically
block echo request packets while forgetting that other ICMP block echo request packets while forgetting that other ICMP
queries can be used for the same purpose.</para> queries can be used for the same purpose.</para>
@@ -1856,7 +1856,7 @@ way.</para>
</variablelist> </variablelist>
</refsect1> </refsect1>
<refsect1 id='man-nse'> <refsect1 id='man-nse'>
<title>NSE&mdash;Scripting extension to the Nmap network scanner<indexterm><primary>NSE</primary></indexterm></title> <title>Nmap Scripting Engine (NSE)<indexterm><primary>NSE</primary></indexterm></title>
<para> <para>
The Nmap Scripting Engine (NSE) combines the efficiency of Nmap's The Nmap Scripting Engine (NSE) combines the efficiency of Nmap's
network handling with the versatility of the lightweight scripting language network handling with the versatility of the lightweight scripting language
@@ -2619,10 +2619,10 @@ to transfer the requested file.</para>
<para>Secure solutions to these problems exist, often in the form of <para>Secure solutions to these problems exist, often in the form of
application-level proxies or protocol-parsing firewall modules. application-level proxies or protocol-parsing firewall modules.
Unfortunately there are also easier, insecure solutions. Noting that Unfortunately there are also easier, insecure solutions. Noting that
DNS replies come from port 53 and active FTP from port 20, many admins DNS replies come from port 53 and active FTP from port 20, many administrators
have fallen into the trap of simply allowing incoming traffic from have fallen into the trap of simply allowing incoming traffic from
those ports. They often assume that no attacker would notice and those ports. They often assume that no attacker would notice and
exploit such firewall holes. In other cases, admins consider this a exploit such firewall holes. In other cases, administrators consider this a
short-term stop-gap measure until they can implement a more secure short-term stop-gap measure until they can implement a more secure
solution. Then they forget the security upgrade. solution. Then they forget the security upgrade.
</para> </para>
@@ -3180,7 +3180,7 @@ overwhelming requests. Specify <option>--open</option> to only see
completion. Restrictions may prevent Nmap from being run completion. Restrictions may prevent Nmap from being run
during working hours, the network could go down, the machine during working hours, the network could go down, the machine
Nmap is running on might suffer a planned or unplanned Nmap is running on might suffer a planned or unplanned
reboot, or Nmap itself could crash. The admin running Nmap reboot, or Nmap itself could crash. The administrator running Nmap
could cancel it for any other reason as well, by pressing could cancel it for any other reason as well, by pressing
<keycap>ctrl-C</keycap>. Restarting the whole scan from the <keycap>ctrl-C</keycap>. Restarting the whole scan from the
beginning may be undesirable. Fortunately, if normal beginning may be undesirable. Fortunately, if normal