1
0
mirror of https://github.com/nmap/nmap.git synced 2026-02-11 07:56:35 +00:00

fix wrong error message

This commit is contained in:
fyodor
2006-09-01 03:45:45 +00:00
parent d07ad58d81
commit 0b9f8c9514
3 changed files with 9 additions and 6 deletions

View File

@@ -3,13 +3,14 @@
4.20ALPHA5
o Worked with Zhao to improve the new OS detection system with
better algorithms, some probe changes, and some bug fixes. We're
better algorithms, probe changes, and bug fixes. We're
now ready to start growing the new database! If Nmap gives you
fingerprints, please submit them at the given URL. The DB is still
extremely small.
extremely small. The new system is extensively documented at
http://insecure.org/nmap/osdetect/ .
o Nmap now supports IP options with the new --ip-options flag. You
can specify any optiosn in hex, or use "R" (record route), "T"
can specify any options in hex, or use "R" (record route), "T"
(record timestamp), "U") (record route & timestamp), "S [route]"
(strict source route), or "L [route]" (loose source route). Specify
--packet-trace to display IP options of responses. For further

View File

@@ -157,7 +157,7 @@ const char *FingerPrintResults::OmitSubmissionFP() {
// can cause asymetric routing which leads to wrong TTL information.
// They can cause variable timing too.
if (distance > 10)
return "Host more than fifteen network hops away";
return "Host more than ten network hops away";
if (maxTimingRatio > 1.4)
return "maxTimingRatio is greater than 1.4";

View File

@@ -2,7 +2,7 @@
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.1).
.\" Instead of manually editing it, you probably should edit the DocBook XML
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
.TH "NMAP" "1" "08/30/2006" "" "Nmap Reference Guide"
.TH "NMAP" "1" "08/31/2006" "" "Nmap Reference Guide"
.\" disable hyphenation
.nh
.\" disable justification (adjust text to left margin only)
@@ -91,6 +91,7 @@ This options summary is printed when Nmap is run with no arguments, and the late
\fI\%http://insecure.org/nmap/data/nmap.usage.txt\fR. It helps people remember the most common options, but is no substitute for the in\-depth documentation in the rest of this manual. Some obscure options aren't even included here.
.PP
.nf
Nmap 4.20ALPHA5 ( http://insecure.org/nmap/ )
Usage: nmap [Scan Type(s)] [Options] {target specification}
TARGET SPECIFICATION:
Can pass hostnames, IP addresses, networks, etc.
@@ -128,7 +129,7 @@ SERVICE/VERSION DETECTION:
\-\-version\-all: Try every single probe (intensity 9)
\-\-version\-trace: Show detailed version scan activity (for debugging)
OS DETECTION:
\-O: Enable OS detection (try 2nd generation, then 1st if that fails)
\-O: Enable OS detection (try 2nd generation w/fallback to 1st)
\-O2: Only use the new OS detection system (no fallback)
\-O1: Only use the old (1st generation) OS detection system
\-\-osscan\-limit: Limit OS detection to promising targets
@@ -151,6 +152,7 @@ FIREWALL/IDS EVASION AND SPOOFING:
\-e <iface>: Use specified interface
\-g/\-\-source\-port <portnum>: Use given port number
\-\-data\-length <num>: Append random data to sent packets
\-\-ip\-options <options>: Send packets with specified ip options
\-\-ttl <val>: Set IP time\-to\-live field
\-\-spoof\-mac <mac address/prefix/vendor name>: Spoof your MAC address
\-\-badsum: Send packets with a bogus TCP/UDP checksum