1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-30 03:19:02 +00:00

fix wrong error message

This commit is contained in:
fyodor
2006-09-01 03:45:45 +00:00
parent d07ad58d81
commit 0b9f8c9514
3 changed files with 9 additions and 6 deletions

View File

@@ -2,7 +2,7 @@
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.1).
.\" Instead of manually editing it, you probably should edit the DocBook XML
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
.TH "NMAP" "1" "08/30/2006" "" "Nmap Reference Guide"
.TH "NMAP" "1" "08/31/2006" "" "Nmap Reference Guide"
.\" disable hyphenation
.nh
.\" disable justification (adjust text to left margin only)
@@ -91,6 +91,7 @@ This options summary is printed when Nmap is run with no arguments, and the late
\fI\%http://insecure.org/nmap/data/nmap.usage.txt\fR. It helps people remember the most common options, but is no substitute for the in\-depth documentation in the rest of this manual. Some obscure options aren't even included here.
.PP
.nf
Nmap 4.20ALPHA5 ( http://insecure.org/nmap/ )
Usage: nmap [Scan Type(s)] [Options] {target specification}
TARGET SPECIFICATION:
Can pass hostnames, IP addresses, networks, etc.
@@ -128,7 +129,7 @@ SERVICE/VERSION DETECTION:
\-\-version\-all: Try every single probe (intensity 9)
\-\-version\-trace: Show detailed version scan activity (for debugging)
OS DETECTION:
\-O: Enable OS detection (try 2nd generation, then 1st if that fails)
\-O: Enable OS detection (try 2nd generation w/fallback to 1st)
\-O2: Only use the new OS detection system (no fallback)
\-O1: Only use the old (1st generation) OS detection system
\-\-osscan\-limit: Limit OS detection to promising targets
@@ -151,6 +152,7 @@ FIREWALL/IDS EVASION AND SPOOFING:
\-e <iface>: Use specified interface
\-g/\-\-source\-port <portnum>: Use given port number
\-\-data\-length <num>: Append random data to sent packets
\-\-ip\-options <options>: Send packets with specified ip options
\-\-ttl <val>: Set IP time\-to\-live field
\-\-spoof\-mac <mac address/prefix/vendor name>: Spoof your MAC address
\-\-badsum: Send packets with a bogus TCP/UDP checksum