1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-29 10:59:02 +00:00

a bunch of tagging, indexterm, and canonicalization improvements

This commit is contained in:
fyodor
2007-09-07 09:51:51 +00:00
parent 6ff6ec3368
commit 343fdbe42f

View File

@@ -149,8 +149,7 @@ option argument) is treated as a target host specification. The
simplest case is to specify a target IP address or hostname for scanning.</para>
<para>Sometimes you wish to scan a whole network of adjacent hosts.
For this, Nmap supports CIDR-style addressing. You can append
<indexterm><primary>CIDR addressing</primary></indexterm>
For this, Nmap supports CIDR-style addressing. You can append<indexterm><primary>CIDR addressing</primary></indexterm>
/<replaceable>numbits</replaceable> to an IP address or hostname and
Nmap will scan every IP address for which the first
<replaceable>numbits</replaceable> are the same as for the reference
@@ -372,9 +371,7 @@ you would expect.</para>
<term>
<option>-sP</option> (Ping Scan)</term>
<listitem>
<para>This option tells Nmap to <emphasis>only</emphasis>
<indexterm><primary>-sP</primary></indexterm>
<indexterm><primary>ping scan</primary></indexterm>
<para>This option tells Nmap to <emphasis>only</emphasis><indexterm><primary>-sP</primary></indexterm><indexterm><primary>ping scan</primary></indexterm>
perform a ping scan (host discovery), then print out the available hosts
that responded to the scan. No further testing (such as
port scanning or OS detection) is performed. This is one
@@ -700,13 +697,23 @@ Traceroute works by sending packets with a low TTL (time-to-live) in an attempt
<varlistentry>
<term>
<option>--reason</option> (Host and port state reasons)
<indexterm significance="normal"><primary>--reason</primary></indexterm>
<indexterm significance="normal"><primary>Host and port state reasons</primary></indexterm>
<indexterm><primary>--reason</primary></indexterm>
<indexterm><primary>Host and port state reasons</primary></indexterm>
</term>
<listitem>
<para>
Shows the reason each port is set to a specific state and the reason each host is up or down. This option displays the type of the packet that determined a port or hosts state. For example, A RST packet from a closed port or an echo reply from an alive host. The information nmap can provide is determined by the type of scan or ping. The SYN scan and SYN ping (\fB\-sS and -PT\fR) are very detailed. Whilst the TCP connect scan and ping (\fB\-sT\fR) are limited by the implementation of connect(). This feature is automatically enabled by the debug flag (\fB\-d\fR) and the results are stored in XML log files even if this option is not specified.
Shows the reason each port is set to a specific state and the reason
each host is up or down. This option displays the type of the packet
that determined a port or hosts state. For example, A <literal>RST</literal> packet from
a closed port or an echo reply from an alive host. The information
Nmap can provide is determined by the type of scan or ping. The SYN
scan and SYN ping (<option>-sS</option> and <option>-PT</option>) are very detailed, but the
TCP connect scan and ping (<option>-sT</option>) are limited by the
implementation of the <literal>connect</literal> system call. This feature is automatically enabled by
the debug option (<option>-d</option>) and the results are stored in XML log files
even if this option is not specified.
</para>
</listitem>
</varlistentry>
@@ -1432,13 +1439,13 @@ way.</para>
port is referred to in the <filename>nmap-services</filename>. You
can even use the wildcards * and ? with the names. For example, to scan
FTP and all ports whose names begin with http, use <option>-p ftp,http*</option>.
Be careful about shell expansions and quote the argument to -p if unsure.</para>
Be careful about shell expansions and quote the argument to <option>-p</option> if unsure.</para>
<para>Ranges of ports can be surrounded by square brackets to indicate
ports inside that range that appear in <filename>nmap-services</filename>.
For example, the following will scan all ports in <filename>nmap-services</filename>
equal to or below 1024: <option>-p [-1024]</option>. Be careful with shell
expansions and quote the argument to -p if unsure.</para>
expansions and quote the argument to <option>-p</option> if unsure.</para>
</listitem>
</varlistentry>
@@ -1511,7 +1518,7 @@ way.</para>
for querying various services and match expressions to recognize
and parse responses. Nmap tries to determine the service protocol
(e.g. FTP, SSH, telnet, http), the application name (e.g. ISC
Bind, Apache httpd, Solaris telnetd), the version number,
BIND, Apache httpd, Solaris telnetd), the version number,
hostname, device type (e.g. printer, router), the OS family
(e.g. Windows, Linux) and sometimes miscellaneous details like
whether an X server is open to connections, the SSH protocol
@@ -1907,7 +1914,7 @@ way.</para>
with the distributed scripts. Therefore, if you, for example, want to see if
a machine is infected by any worm Nmap provides a script for you can simply
run <command>nmap --script=malware target-ip</command> and check the output
afterwards. The <literal>version</literal>-scripts are always run
afterwards. The <literal>version</literal> scripts are always run
implicitely when a script-scan is requested. The
<filename>script.db</filename> is a Lua-script itself and can be updated
through the <option>--script-updatedb</option> option.
@@ -1942,7 +1949,7 @@ way.</para>
<listitem>
<para>performs a script scan using the default set of scripts. it is
equivalent to <literal>--script=safe,intrusive</literal></para>
equivalent to <option>--script=safe,intrusive</option></para>
</listitem>
</varlistentry>
@@ -2325,16 +2332,19 @@ worth the extra time.</para>
<listitem>
<para>While the fine grained timing controls discussed in the previous
<para>While the fine-grained timing controls discussed in the previous
section are powerful and effective, some people find them confusing.
Moreover, choosing the appropriate values can sometimes take more time
than the scan you are trying to optimize. So Nmap offers a simpler
approach, with six timing templates. You can specify them with the
<option>-T</option> option and their number (0&ndash;5) or their name.
The template names are paranoid (0), sneaky (1), polite (2), normal
(3), aggressive (4), and insane (5). The first two are for IDS
evasion. Polite mode slows down the scan to use less bandwidth and
target machine resources. Normal mode is the default and so
The template names are <option>paranoid</option> (<option>0</option>),
<option>sneaky</option> (<option>1</option>), <option>polite</option>
(<option>2</option>), <option>normal</option> (<option>3</option>),
<option>aggressive</option> (<option>4</option>), and
<option>insane</option> (<option>5</option>). The first two are for
IDS evasion. Polite mode slows down the scan to use less bandwidth
and target machine resources. Normal mode is the default and so
<option>-T3</option> does nothing. Aggressive mode speeds scans up by
making the assumption that you are on a reasonably fast and reliable
network. Finally insane mode assumes that you are on an
@@ -2343,16 +2353,16 @@ for speed.</para>
<para>These templates allow the user to specify how aggressive they
wish to be, while leaving Nmap to pick the exact timing values. The
templates also make some minor speed adjustments for which fine
grained control options do not currently exist. For example,
templates also make some minor speed adjustments for which
fine-grained control options do not currently exist. For example,
<option>-T4</option> prohibits the dynamic scan delay from exceeding
10ms for TCP ports and <option>-T5</option> caps that value at 5
milliseconds. Templates can be used in combination with fine grained
milliseconds. Templates can be used in combination with fine-grained
controls, and the fine-grained controls will you specify will take
precedence over the timing template default for that parameter. I
recommend using <option>-T4</option> when scanning reasonably modern
and reliable networks. Keep that option even when you add fine
grained controls so that you benefit from those extra minor
and reliable networks. Keep that option even when you add
fine-grained controls so that you benefit from those extra minor
optimizations that it enables.</para>
<para>If you are on a decent broadband or ethernet connection, I would
@@ -3102,7 +3112,7 @@ overwhelming requests. Specify <option>--open</option> to only see
<term>
<option>--iflist</option> (List interfaces and routes)
<indexterm><primary>--iflist</primary></indexterm>
</term> <listitem>
</term><listitem>
<para>Prints the interface list and system routes as detected
by Nmap. This is useful for debugging routing problems or
device mischaracterization (such as Nmap treating a PPP
@@ -3218,7 +3228,7 @@ overwhelming requests. Specify <option>--open</option> to only see
a machine that doesn't have Nmap (and thus
<filename>nmap.xsl</filename>) installed. So the URL is
often more useful, but the local filesystem location of
nmap.xsl is used by default for privacy reasons.</para>
<filename>nmap.xsl</filename> is used by default for privacy reasons.</para>
</listitem>
</varlistentry>
@@ -3604,13 +3614,13 @@ overwhelming requests. Specify <option>--open</option> to only see
do not currently exist.</para>
<para>
<userinput>nmap -v scanme.nmap.org</userinput>
<command>nmap -v scanme.nmap.org</command>
</para>
<para>This option scans all reserved TCP ports on the machine
<literal>scanme.nmap.org</literal> . The <option>-v</option>
option enables verbose mode.</para>
<para>
<userinput>nmap -sS -O scanme.nmap.org/24</userinput>
<command>nmap -sS -O scanme.nmap.org/24</command>
</para>
<para>Launches a stealth SYN scan against each machine that is
up out of the 255 machines on <quote>class C</quote> network where
@@ -3619,8 +3629,8 @@ overwhelming requests. Specify <option>--open</option> to only see
running. This requires root privileges because of the SYN scan
and OS detection.</para>
<para>
<userinput>nmap -sV -p 22,53,110,143,4564
198.116.0-255.1-127</userinput>
<command>nmap -sV -p 22,53,110,143,4564
198.116.0-255.1-127</command>
</para>
<para>Launches host enumeration and a TCP scan at the first half
@@ -3631,7 +3641,7 @@ overwhelming requests. Specify <option>--open</option> to only see
what application is running.</para>
<para>
<userinput>nmap -v -iR 100000 -P0 -p 80</userinput>
<command>nmap -v -iR 100000 -P0 -p 80</command>
</para>
<para>Asks Nmap to choose 100,000 hosts at random and scan them
@@ -3641,8 +3651,8 @@ overwhelming requests. Specify <option>--open</option> to only see
probing one port on each target host anyway.</para>
<para>
<userinput>nmap -P0 -p80 -oX logs/pb-port80scan.xml -oG
logs/pb-port80scan.gnmap 216.163.128.20/20</userinput>
<command>nmap -P0 -p80 -oX logs/pb-port80scan.xml -oG
logs/pb-port80scan.gnmap 216.163.128.20/20</command>
</para>
<para>This scans 4096 IPs for any webservers (without pinging
them) and saves the output in grepable and XML formats.</para>