mirror of
https://github.com/nmap/nmap.git
synced 2025-12-15 12:19:02 +00:00
misc
This commit is contained in:
22
docs/nmap.1
22
docs/nmap.1
@@ -784,6 +784,28 @@ to randomize the order in which ports are scanned.
|
||||
.B \-\-ttl <value>
|
||||
Sets the IPv4 time to live field in sent packets to the given value.
|
||||
.TP
|
||||
.B \-\-privileged
|
||||
Tells Nmap to simply assume that it is privileged enough to perform
|
||||
raw socket sends, packet sniffing, and similar operations that usually
|
||||
require root privileges on UNIX systems. By default Nmap bails if
|
||||
such operations are requested but geteuid() is not zero. --privileged
|
||||
is useful with Linux kernel capabilities and similar systems that may
|
||||
be configured to allow unprivileged users to perform raw-packet
|
||||
scans. Be sure to provide this option flag before any flags for
|
||||
options that require privileges (SYN scan, OS detection, etc.). The
|
||||
NMAP_PRIVILEGED variable may be set as an equivalent alternative
|
||||
--privileged.
|
||||
.TP
|
||||
.B \-\-interactive
|
||||
Starts Nmap in interactive mode, which offers an interactive Nmap
|
||||
prompt allowing easy launching of multiple scans (either synchronously
|
||||
or in the background). This is useful for people who scan from
|
||||
multi-user systems -- they often want to test their security without
|
||||
letting everyone else on the system know exactly which systems they
|
||||
are scanning. Use --interactive to activate this mode and then type
|
||||
'h' for help. This option is rarely used because proper shells are
|
||||
usually more familiar and feature-complete.
|
||||
.TP
|
||||
.B \-\-randomize_hosts
|
||||
Tells Nmap to shuffle each group of up to 2048 hosts before
|
||||
it scans them. This can make the scans less obvious to
|
||||
|
||||
@@ -110,7 +110,7 @@
|
||||
output.c:printosscanoutput()
|
||||
-->
|
||||
<!ELEMENT host ( status, address , (address | hostnames |
|
||||
smurf | ports | addport | os | uptime |
|
||||
smurf | ports | os | uptime |
|
||||
tcpsequence | ipidsequence | tcptssequence )* ) >
|
||||
|
||||
|
||||
@@ -137,16 +137,6 @@
|
||||
<!ELEMENT smurf EMPTY >
|
||||
<!ATTLIST smurf responses %attr_numeric; #REQUIRED >
|
||||
|
||||
<!-- this element is written by portlist.cc:addport() -->
|
||||
<!ELEMENT addport EMPTY >
|
||||
<!ATTLIST addport
|
||||
state %port_states; #REQUIRED
|
||||
owner CDATA #IMPLIED
|
||||
portid %attr_numeric; #REQUIRED
|
||||
protocol %port_protocols; #REQUIRED
|
||||
>
|
||||
|
||||
|
||||
<!-- these elements are written by output.c:printportoutput() -->
|
||||
|
||||
<!ELEMENT ports (extraports? , port*) >
|
||||
@@ -154,7 +144,7 @@
|
||||
<!ELEMENT extraports EMPTY >
|
||||
<!ATTLIST extraports
|
||||
state %port_states; #REQUIRED
|
||||
count %attr_numeric; "closed"
|
||||
count %attr_numeric; #REQUIRED
|
||||
>
|
||||
|
||||
<!ELEMENT port (state , owner? , service? ) >
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
Nmap 3.82CSW Usage: nmap [Scan Type(s)] [Options] <host or net list>
|
||||
Nmap 3.82.1CSW Usage: nmap [Scan Type(s)] [Options] <host or net list>
|
||||
Some Common Scan Types ('*' options require root privileges)
|
||||
* -sS TCP SYN stealth port scan (default if privileged (root))
|
||||
-sT TCP connect() port scan (default for unprivileged users)
|
||||
|
||||
@@ -536,6 +536,13 @@ function timestamp2date(stamp)
|
||||
</xsl:template>
|
||||
<!-- ............................................................ -->
|
||||
|
||||
<!-- os fingerprint -->
|
||||
<!-- ............................................................ -->
|
||||
<xsl:template match="osfingerprint">
|
||||
<li>os fingerprint: <em><xsl:value-of select="@fingerprint" /></em></li>
|
||||
</xsl:template>
|
||||
<!-- ............................................................ -->
|
||||
|
||||
<!-- uptime -->
|
||||
<!-- ............................................................ -->
|
||||
<xsl:template match="uptime">
|
||||
|
||||
Reference in New Issue
Block a user