diff --git a/docs/nmap.1 b/docs/nmap.1
index d21ce4c08..dfb70d26d 100644
--- a/docs/nmap.1
+++ b/docs/nmap.1
@@ -1,12 +1,12 @@
.\" Title: nmap
.\" Author: [see the "Author" section]
.\" Generator: DocBook XSL Stylesheets v1.74.0
-.\" Date: 06/02/2009
+.\" Date: 06/06/2009
.\" Manual: Nmap Reference Guide
.\" Source: Nmap
.\" Language: English
.\"
-.TH "NMAP" "1" "06/02/2009" "Nmap" "Nmap Reference Guide"
+.TH "NMAP" "1" "06/06/2009" "Nmap" "Nmap Reference Guide"
.\" -----------------------------------------------------------------
.\" * (re)Define some macros
.\" -----------------------------------------------------------------
@@ -278,7 +278,7 @@ This options summary is printed when Nmap is run with no arguments, and the late
.ps -1
.nf
.BB lightgray
-Nmap 4\&.85BETA9 ( http://nmap\&.org )
+Nmap 4\&.85BETA10 ( http://nmap\&.org )
Usage: nmap [Scan Type(s)] [Options] {target specification}
TARGET SPECIFICATION:
Can pass hostnames, IP addresses, networks, etc\&.
@@ -291,7 +291,7 @@ HOST DISCOVERY:
\-sL: List Scan \- simply list targets to scan
\-sP: Ping Scan \- go no further than determining if host is online
\-PN: Treat all hosts as online \-\- skip host discovery
- \-PS/PA/PU[portlist]: TCP SYN/ACK or UDP discovery to given ports
+ \-PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports
\-PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes
\-PO[protocol list]: IP Protocol Ping
\-n/\-R: Never do DNS resolution/Always resolve [default: sometimes]
@@ -304,6 +304,7 @@ SCAN TECHNIQUES:
\-sN/sF/sX: TCP Null, FIN, and Xmas scans
\-\-scanflags : Customize TCP scan flags
\-sI : Idle scan
+ \-sY/sZ: SCTP INIT/COOKIE\-ECHO scans
\-sO: IP protocol scan
\-b : FTP bounce scan
PORT SPECIFICATION AND SCAN ORDER:
@@ -353,7 +354,8 @@ FIREWALL/IDS EVASION AND SPOOFING:
\-\-ip\-options : Send packets with specified ip options
\-\-ttl : Set IP time\-to\-live field
\-\-spoof\-mac : Spoof your MAC address
- \-\-badsum: Send packets with a bogus TCP/UDP checksum
+ \-\-badsum: Send packets with a bogus TCP/UDP/SCTP checksum
+ \-\-adler32: Use deprecated Adler32 instead of CRC32C for SCTP checksums
OUTPUT:
\-oN/\-oX/\-oS/\-oG : Output scan in normal, XML, s|: Customize TCP scan flags
-sI : Idle scan
+ -sY/sZ: SCTP INIT/COOKIE-ECHO scans
-sO: IP protocol scan
-b : FTP bounce scan
PORT SPECIFICATION AND SCAN ORDER:
@@ -73,7 +74,8 @@ FIREWALL/IDS EVASION AND SPOOFING:
--ip-options : Send packets with specified ip options
--ttl : Set IP time-to-live field
--spoof-mac : Spoof your MAC address
- --badsum: Send packets with a bogus TCP/UDP checksum
+ --badsum: Send packets with a bogus TCP/UDP/SCTP checksum
+ --adler32: Use deprecated Adler32 instead of CRC32C for SCTP checksums
OUTPUT:
-oN/-oX/-oS/-oG : Output scan in normal, XML, s|
-.\" Date: 06/02/2009
+.\" Date: 06/06/2009
.\" Manual: Zenmap Reference Guide
.\" Source: Zenmap
.\" Language: English
.\"
-.TH "ZENMAP" "1" "06/02/2009" "Zenmap" "Zenmap Reference Guide"
+.TH "ZENMAP" "1" "06/06/2009" "Zenmap" "Zenmap Reference Guide"
.\" -----------------------------------------------------------------
.\" * (re)Define some macros
.\" -----------------------------------------------------------------
diff --git a/nmap.h b/nmap.h
index 369980e9c..47f7c60f6 100644
--- a/nmap.h
+++ b/nmap.h
@@ -252,8 +252,8 @@ void *realloc();
#ifndef NMAP_VERSION
/* Edit this definition only within the quotes, because it is read from this
file by the makefiles. */
-#define NMAP_VERSION "4.85BETA9"
-#define NMAP_NUM_VERSION "4.85.0.9"
+#define NMAP_VERSION "4.85BETA10"
+#define NMAP_NUM_VERSION "4.85.0.10"
#endif
/* User configurable #defines: */
diff --git a/scripts/script.db b/scripts/script.db
index d28bb473c..08bdd56f6 100644
--- a/scripts/script.db
+++ b/scripts/script.db
@@ -13,7 +13,7 @@ Entry { filename = "ftp-bounce.nse", categories = { "default", "intrusive", } }
Entry { filename = "ftp-brute.nse", categories = { "auth", "intrusive", } }
Entry { filename = "html-title.nse", categories = { "default", "discovery", "safe", } }
Entry { filename = "http-auth.nse", categories = { "auth", "default", "intrusive", } }
-Entry { filename = "http-iis-webdav-vuln.nse", categories = { "discovery", } }
+Entry { filename = "http-iis-webdav-vuln.nse", categories = { "intrusive", "vuln", } }
Entry { filename = "http-open-proxy.nse", categories = { "default", "discovery", "external", "intrusive", } }
Entry { filename = "http-passwd.nse", categories = { "intrusive", "vuln", } }
Entry { filename = "http-trace.nse", categories = { "discovery", } }