diff --git a/docs/nmap.1 b/docs/nmap.1 index d21ce4c08..dfb70d26d 100644 --- a/docs/nmap.1 +++ b/docs/nmap.1 @@ -1,12 +1,12 @@ .\" Title: nmap .\" Author: [see the "Author" section] .\" Generator: DocBook XSL Stylesheets v1.74.0 -.\" Date: 06/02/2009 +.\" Date: 06/06/2009 .\" Manual: Nmap Reference Guide .\" Source: Nmap .\" Language: English .\" -.TH "NMAP" "1" "06/02/2009" "Nmap" "Nmap Reference Guide" +.TH "NMAP" "1" "06/06/2009" "Nmap" "Nmap Reference Guide" .\" ----------------------------------------------------------------- .\" * (re)Define some macros .\" ----------------------------------------------------------------- @@ -278,7 +278,7 @@ This options summary is printed when Nmap is run with no arguments, and the late .ps -1 .nf .BB lightgray -Nmap 4\&.85BETA9 ( http://nmap\&.org ) +Nmap 4\&.85BETA10 ( http://nmap\&.org ) Usage: nmap [Scan Type(s)] [Options] {target specification} TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc\&. @@ -291,7 +291,7 @@ HOST DISCOVERY: \-sL: List Scan \- simply list targets to scan \-sP: Ping Scan \- go no further than determining if host is online \-PN: Treat all hosts as online \-\- skip host discovery - \-PS/PA/PU[portlist]: TCP SYN/ACK or UDP discovery to given ports + \-PS/PA/PU/PY[portlist]: TCP SYN/ACK, UDP or SCTP discovery to given ports \-PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes \-PO[protocol list]: IP Protocol Ping \-n/\-R: Never do DNS resolution/Always resolve [default: sometimes] @@ -304,6 +304,7 @@ SCAN TECHNIQUES: \-sN/sF/sX: TCP Null, FIN, and Xmas scans \-\-scanflags : Customize TCP scan flags \-sI : Idle scan + \-sY/sZ: SCTP INIT/COOKIE\-ECHO scans \-sO: IP protocol scan \-b : FTP bounce scan PORT SPECIFICATION AND SCAN ORDER: @@ -353,7 +354,8 @@ FIREWALL/IDS EVASION AND SPOOFING: \-\-ip\-options : Send packets with specified ip options \-\-ttl : Set IP time\-to\-live field \-\-spoof\-mac : Spoof your MAC address - \-\-badsum: Send packets with a bogus TCP/UDP checksum + \-\-badsum: Send packets with a bogus TCP/UDP/SCTP checksum + \-\-adler32: Use deprecated Adler32 instead of CRC32C for SCTP checksums OUTPUT: \-oN/\-oX/\-oS/\-oG : Output scan in normal, XML, s|: Customize TCP scan flags -sI : Idle scan + -sY/sZ: SCTP INIT/COOKIE-ECHO scans -sO: IP protocol scan -b : FTP bounce scan PORT SPECIFICATION AND SCAN ORDER: @@ -73,7 +74,8 @@ FIREWALL/IDS EVASION AND SPOOFING: --ip-options : Send packets with specified ip options --ttl : Set IP time-to-live field --spoof-mac : Spoof your MAC address - --badsum: Send packets with a bogus TCP/UDP checksum + --badsum: Send packets with a bogus TCP/UDP/SCTP checksum + --adler32: Use deprecated Adler32 instead of CRC32C for SCTP checksums OUTPUT: -oN/-oX/-oS/-oG : Output scan in normal, XML, s| -.\" Date: 06/02/2009 +.\" Date: 06/06/2009 .\" Manual: Zenmap Reference Guide .\" Source: Zenmap .\" Language: English .\" -.TH "ZENMAP" "1" "06/02/2009" "Zenmap" "Zenmap Reference Guide" +.TH "ZENMAP" "1" "06/06/2009" "Zenmap" "Zenmap Reference Guide" .\" ----------------------------------------------------------------- .\" * (re)Define some macros .\" ----------------------------------------------------------------- diff --git a/nmap.h b/nmap.h index 369980e9c..47f7c60f6 100644 --- a/nmap.h +++ b/nmap.h @@ -252,8 +252,8 @@ void *realloc(); #ifndef NMAP_VERSION /* Edit this definition only within the quotes, because it is read from this file by the makefiles. */ -#define NMAP_VERSION "4.85BETA9" -#define NMAP_NUM_VERSION "4.85.0.9" +#define NMAP_VERSION "4.85BETA10" +#define NMAP_NUM_VERSION "4.85.0.10" #endif /* User configurable #defines: */ diff --git a/scripts/script.db b/scripts/script.db index d28bb473c..08bdd56f6 100644 --- a/scripts/script.db +++ b/scripts/script.db @@ -13,7 +13,7 @@ Entry { filename = "ftp-bounce.nse", categories = { "default", "intrusive", } } Entry { filename = "ftp-brute.nse", categories = { "auth", "intrusive", } } Entry { filename = "html-title.nse", categories = { "default", "discovery", "safe", } } Entry { filename = "http-auth.nse", categories = { "auth", "default", "intrusive", } } -Entry { filename = "http-iis-webdav-vuln.nse", categories = { "discovery", } } +Entry { filename = "http-iis-webdav-vuln.nse", categories = { "intrusive", "vuln", } } Entry { filename = "http-open-proxy.nse", categories = { "default", "discovery", "external", "intrusive", } } Entry { filename = "http-passwd.nse", categories = { "intrusive", "vuln", } } Entry { filename = "http-trace.nse", categories = { "discovery", } }