1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-06 04:31:29 +00:00

Regenerate man pages from the source XML

This commit is contained in:
fyodor
2015-03-04 02:58:45 +00:00
parent 8c680628a4
commit 6e218d7d7f
6 changed files with 56 additions and 85 deletions

View File

@@ -2,12 +2,12 @@
.\" Title: nmap-update .\" Title: nmap-update
.\" Author: [FIXME: author] [see http://docbook.sf.net/el/author] .\" Author: [FIXME: author] [see http://docbook.sf.net/el/author]
.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
.\" Date: 11/22/2014 .\" Date: 03/03/2015
.\" Manual: nmap-update Reference Guide .\" Manual: nmap-update Reference Guide
.\" Source: nmap-update .\" Source: nmap-update
.\" Language: English .\" Language: English
.\" .\"
.TH "NMAP\-UPDATE" "1" "11/22/2014" "nmap\-update" "nmap\-update Reference Guide" .TH "NMAP\-UPDATE" "1" "03/03/2015" "nmap\-update" "nmap\-update Reference Guide"
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------
.\" * Define some portability stuff .\" * Define some portability stuff
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------

View File

@@ -2,12 +2,12 @@
.\" Title: nmap .\" Title: nmap
.\" Author: [see the "Author" section] .\" Author: [see the "Author" section]
.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
.\" Date: 01/30/2015 .\" Date: 03/03/2015
.\" Manual: Nmap Reference Guide .\" Manual: Nmap Reference Guide
.\" Source: Nmap .\" Source: Nmap
.\" Language: English .\" Language: English
.\" .\"
.TH "NMAP" "1" "01/30/2015" "Nmap" "Nmap Reference Guide" .TH "NMAP" "1" "03/03/2015" "Nmap" "Nmap Reference Guide"
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------
.\" * Define some portability stuff .\" * Define some portability stuff
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------

View File

@@ -2,12 +2,12 @@
.\" Title: zenmap .\" Title: zenmap
.\" Author: [see the "Authors" section] .\" Author: [see the "Authors" section]
.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
.\" Date: 11/22/2014 .\" Date: 03/03/2015
.\" Manual: Zenmap Reference Guide .\" Manual: Zenmap Reference Guide
.\" Source: Zenmap .\" Source: Zenmap
.\" Language: English .\" Language: English
.\" .\"
.TH "ZENMAP" "1" "11/22/2014" "Zenmap" "Zenmap Reference Guide" .TH "ZENMAP" "1" "03/03/2015" "Zenmap" "Zenmap Reference Guide"
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------
.\" * Define some portability stuff .\" * Define some portability stuff
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------

View File

@@ -2,12 +2,12 @@
.\" Title: Ncat .\" Title: Ncat
.\" Author: [see the "Authors" section] .\" Author: [see the "Authors" section]
.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
.\" Date: 10/22/2014 .\" Date: 03/03/2015
.\" Manual: Ncat Reference Guide .\" Manual: Ncat Reference Guide
.\" Source: Ncat .\" Source: Ncat
.\" Language: English .\" Language: English
.\" .\"
.TH "NCAT" "1" "10/22/2014" "Ncat" "Ncat Reference Guide" .TH "NCAT" "1" "03/03/2015" "Ncat" "Ncat Reference Guide"
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------
.\" * Define some portability stuff .\" * Define some portability stuff
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------
@@ -90,6 +90,7 @@ Options taking a time assume seconds\&. Append \*(Aqms\*(Aq for milliseconds,
\-\-ssl\-key Specify SSL private key (PEM) for listening \-\-ssl\-key Specify SSL private key (PEM) for listening
\-\-ssl\-verify Verify trust and domain name of certificates \-\-ssl\-verify Verify trust and domain name of certificates
\-\-ssl\-trustfile PEM file containing trusted SSL certificates \-\-ssl\-trustfile PEM file containing trusted SSL certificates
\-\-ssl\-ciphers Cipherlist containing SSL ciphers to use
\-\-version Display Ncat\*(Aqs version information and exit \-\-version Display Ncat\*(Aqs version information and exit
See the ncat(1) manpage for full options, descriptions and usage examples See the ncat(1) manpage for full options, descriptions and usage examples
@@ -114,9 +115,7 @@ arguments tell what to connect to\&.
\fB\fIhostname\fR\fR \fB\fIhostname\fR\fR
is required, and may be a hostname or IP address\&. If is required, and may be a hostname or IP address\&. If
\fB\fIport\fR\fR \fB\fIport\fR\fR
is supplied, it must be a decimal port number\&. If omitted, it defaults to 31337\&. is supplied, it must be a decimal port number\&. If omitted, it defaults to 31337\&..\" default port of Ncat.\" 31337
.\" default port of Ncat
.\" 31337
.PP .PP
In listen mode, In listen mode,
\fB\fIhostname\fR\fR \fB\fIhostname\fR\fR
@@ -238,15 +237,14 @@ In client mode,
is like is like
\fB\-\-ssl\fR \fB\-\-ssl\fR
except that it also requires verification of the server certificate\&. Ncat comes with a default set of trusted certificates in the file except that it also requires verification of the server certificate\&. Ncat comes with a default set of trusted certificates in the file
ca\-bundle\&.crt ca\-bundle\&.crt\&..\" ca-bundle.crt
.\" ca-bundle.crt\&. Some operating systems provide a default list of trusted certificates; these will also be used if available\&. Use Some operating systems provide a default list of trusted certificates; these will also be used if available\&. Use
\fB\-\-ssl\-trustfile\fR \fB\-\-ssl\-trustfile\fR
to give a custom list\&. Use to give a custom list\&. Use
\fB\-v\fR \fB\-v\fR
one or more times to get details about verification failures\&. one or more times to get details about verification failures\&.
.\" revoked certificates .\" revoked certificates
Ncat does not check for revoked certificates Ncat does not check for revoked certificates\&..\" certification revocation
.\" certification revocation\&.
.sp .sp
This option has no effect in server mode\&. This option has no effect in server mode\&.
.RE .RE
@@ -266,10 +264,15 @@ This option gives the location of the PEM\-encoded private key file that goes wi
\fB\-\-ssl\-trustfile \fR\fB\fIcert\&.pem\fR\fR (List trusted certificates) .\" --ssl-trustfile (Ncat option) \fB\-\-ssl\-trustfile \fR\fB\fIcert\&.pem\fR\fR (List trusted certificates) .\" --ssl-trustfile (Ncat option)
.RS 4 .RS 4
This option sets a list of certificates that are trusted for purposes of certificate verification\&. It has no effect unless combined with This option sets a list of certificates that are trusted for purposes of certificate verification\&. It has no effect unless combined with
\fB\-\-ssl\-verify\fR\&. The argument to this option is the name of a PEM \fB\-\-ssl\-verify\fR\&. The argument to this option is the name of a PEM.\" PEM (Privacy Enhanced Mail)
.\" PEM (Privacy Enhanced Mail)
file containing trusted certificates\&. Typically, the file will contain certificates of certification authorities, though it may also contain server certificates directly\&. When this option is used, Ncat does not use its default certificates\&. file containing trusted certificates\&. Typically, the file will contain certificates of certification authorities, though it may also contain server certificates directly\&. When this option is used, Ncat does not use its default certificates\&.
.RE .RE
.PP
\fB\-\-ssl\-ciphers \fR\fB\fIcipherlist\fR\fR (Specify SSL ciphersuites) .\" --ssl-ciphers (Ncat option)
.RS 4
This option sets the list of ciphersuites that Ncat will use when connecting to servers or when accepting SSL connections from clients\&. The syntax is described in the OpenSSL ciphers(1) man page, and defaults to
ALL:!ADH:!LOW:!EXP:!MD5:@STRENGTH
.RE
.SH "PROXY OPTIONS" .SH "PROXY OPTIONS"
.PP .PP
\fB\-\-proxy \fR\fB\fIhost\fR\fR\fB[:\fR\fB\fIport\fR\fR\fB]\fR (Specify proxy address) .\" --proxy (Ncat option) \fB\-\-proxy \fR\fB\fIhost\fR\fR\fB[:\fR\fB\fIport\fR\fR\fB]\fR (Specify proxy address) .\" --proxy (Ncat option)
@@ -444,12 +447,9 @@ and it will be verbose and display all kinds of useful connection based informat
.PP .PP
\fB\-C\fR, \fB\-\-crlf\fR (Use CRLF as EOL) .\" --crlf (Ncat option) .\" -C (Ncat option) \fB\-C\fR, \fB\-\-crlf\fR (Use CRLF as EOL) .\" --crlf (Ncat option) .\" -C (Ncat option)
.RS 4 .RS 4
This option tells Ncat to convert LF This option tells Ncat to convert LF.\" LF line ending
.\" LF line ending line endings to CRLF.\" CRLF line ending
line endings to CRLF when taking input from standard input\&..\" standard input
.\" CRLF line ending
when taking input from standard input\&.
.\" standard input
This is useful for talking to some stringent servers directly from a terminal in one of the many common plain\-text protocols that use CRLF for end\-of\-line\&. This is useful for talking to some stringent servers directly from a terminal in one of the many common plain\-text protocols that use CRLF for end\-of\-line\&.
.RE .RE
.PP .PP
@@ -648,8 +648,7 @@ Source is provided to this software because we believe users have a right to kno
.PP .PP
Source code also allows you to port Nmap (which includes Ncat) to new platforms, fix bugs, and add new features\&. You are highly encouraged to send your changes to Source code also allows you to port Nmap (which includes Ncat) to new platforms, fix bugs, and add new features\&. You are highly encouraged to send your changes to
<dev@nmap\&.org> <dev@nmap\&.org>
for possible incorporation into the main distribution\&. By sending these changes to Fyodor or one of the Insecure\&.Org development mailing lists, it is assumed that you are offering the Nmap Project (Insecure\&.Com LLC) the unlimited, non\-exclusive right to reuse, modify, and relicense the code\&. Nmap will always be available open source, for possible incorporation into the main distribution\&. By sending these changes to Fyodor or one of the Insecure\&.Org development mailing lists, it is assumed that you are offering the Nmap Project (Insecure\&.Com LLC) the unlimited, non\-exclusive right to reuse, modify, and relicense the code\&. Nmap will always be available open source,.\" open source
.\" open source
but this is important because the inability to relicense code has caused devastating problems for other Free Software projects (such as KDE and NASM)\&. We also occasionally relicense the code to third parties as discussed in the Nmap man page\&. If you wish to specify special license conditions of your contributions, just say so when you send them\&. but this is important because the inability to relicense code has caused devastating problems for other Free Software projects (such as KDE and NASM)\&. We also occasionally relicense the code to third parties as discussed in the Nmap man page\&. If you wish to specify special license conditions of your contributions, just say so when you send them\&.
.SS "No Warranty.\" warranty (lack of)" .SS "No Warranty.\" warranty (lack of)"
.PP .PP
@@ -659,26 +658,20 @@ COPYING
file included with Nmap\&. file included with Nmap\&.
.SS "Inappropriate Usage" .SS "Inappropriate Usage"
.PP .PP
Ncat should never be installed with special privileges (e\&.g\&. suid root)\&. Ncat should never be installed with special privileges (e\&.g\&. suid root)\&..\" suid
.\" suid
That would open up a major security vulnerability as other users on the system (or attackers) could use it for privilege escalation\&. That would open up a major security vulnerability as other users on the system (or attackers) could use it for privilege escalation\&.
.SS "Third\-Party Software" .SS "Third\-Party Software"
.PP .PP
This product includes software developed by the This product includes software developed by the
\m[blue]\fBApache Software Foundation\fR\m[]\&\s-2\u[2]\d\s+2\&. A modified version of the \m[blue]\fBApache Software Foundation\fR\m[]\&\s-2\u[2]\d\s+2\&. A modified version of the
\m[blue]\fBLibpcap portable packet capture library\fR\m[]\&\s-2\u[3]\d\s+2 \m[blue]\fBLibpcap portable packet capture library\fR\m[]\&\s-2\u[3]\d\s+2.\" libpcap
.\" libpcap
is distributed along with Ncat\&. The Windows version of Ncat utilized the Libpcap\-derived is distributed along with Ncat\&. The Windows version of Ncat utilized the Libpcap\-derived
\m[blue]\fBWinPcap library\fR\m[]\&\s-2\u[4]\d\s+2 \m[blue]\fBWinPcap library\fR\m[]\&\s-2\u[4]\d\s+2.\" WinPcap
.\" WinPcap
instead\&. Certain raw networking functions use the instead\&. Certain raw networking functions use the
\m[blue]\fBLibdnet\fR\m[]\&\s-2\u[5]\d\s+2 \m[blue]\fBLibdnet\fR\m[]\&\s-2\u[5]\d\s+2.\" libdnet
.\" libdnet networking library, which was written by Dug Song\&..\" Song, Dug
networking library, which was written by Dug Song\&.
.\" Song, Dug
A modified version is distributed with Ncat\&. Ncat can optionally link with the A modified version is distributed with Ncat\&. Ncat can optionally link with the
\m[blue]\fBOpenSSL cryptography toolkit\fR\m[]\&\s-2\u[6]\d\s+2 \m[blue]\fBOpenSSL cryptography toolkit\fR\m[]\&\s-2\u[6]\d\s+2.\" OpenSSL
.\" OpenSSL
for SSL version detection support\&. All of the third\-party software described in this paragraph is freely redistributable under BSD\-style software licenses\&. for SSL version detection support\&. All of the third\-party software described in this paragraph is freely redistributable under BSD\-style software licenses\&.
.SH "NOTES" .SH "NOTES"
.IP " 1." 4 .IP " 1." 4

View File

@@ -2,12 +2,12 @@
.\" Title: ndiff .\" Title: ndiff
.\" Author: [see the "Authors" section] .\" Author: [see the "Authors" section]
.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
.\" Date: 10/22/2014 .\" Date: 03/03/2015
.\" Manual: User Commands .\" Manual: User Commands
.\" Source: Ndiff .\" Source: Ndiff
.\" Language: English .\" Language: English
.\" .\"
.TH "NDIFF" "1" "10/22/2014" "Ndiff" "User Commands" .TH "NDIFF" "1" "03/03/2015" "Ndiff" "User Commands"
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------
.\" * Define some portability stuff .\" * Define some portability stuff
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------

View File

@@ -2,12 +2,12 @@
.\" Title: nping .\" Title: nping
.\" Author: [see the "Authors" section] .\" Author: [see the "Authors" section]
.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
.\" Date: 10/22/2014 .\" Date: 03/03/2015
.\" Manual: Nping Reference Guide .\" Manual: Nping Reference Guide
.\" Source: Nping .\" Source: Nping
.\" Language: English .\" Language: English
.\" .\"
.TH "NPING" "1" "10/22/2014" "Nping" "Nping Reference Guide" .TH "NPING" "1" "03/03/2015" "Nping" "Nping Reference Guide"
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------
.\" * Define some portability stuff .\" * Define some portability stuff
.\" ----------------------------------------------------------------- .\" -----------------------------------------------------------------
@@ -222,8 +222,7 @@ SEE THE MAN PAGE FOR MANY MORE OPTIONS, DESCRIPTIONS, AND EXAMPLES
.PP .PP
Everything on the Nping command line that isn\*(Aqt an option or an option argument is treated as a target host specification\&. Nping uses the same syntax for target specifications that Nmap does\&. The simplest case is a single target given by IP address or hostname\&. Everything on the Nping command line that isn\*(Aqt an option or an option argument is treated as a target host specification\&. Nping uses the same syntax for target specifications that Nmap does\&. The simplest case is a single target given by IP address or hostname\&.
.PP .PP
Nping supports CIDR\-style Nping supports CIDR\-style.\" CIDR (Classless Inter-Domain Routing)
.\" CIDR (Classless Inter-Domain Routing)
addressing\&. You can append addressing\&. You can append
/\fInumbits\fR /\fInumbits\fR
to an IPv4 address or hostname and Nping will send probes to every IP address for which the first to an IPv4 address or hostname and Nping will send probes to every IP address for which the first
@@ -234,8 +233,7 @@ would send probes to the 256 hosts between 192\&.168\&.10\&.0 (binary:
11000000 10101000 00001010 00000000) and 192\&.168\&.10\&.255 (binary: 11000000 10101000 00001010 00000000) and 192\&.168\&.10\&.255 (binary:
11000000 10101000 00001010 11111111), inclusive\&. 11000000 10101000 00001010 11111111), inclusive\&.
192\&.168\&.10\&.40/24 192\&.168\&.10\&.40/24
would ping exactly the same targets\&. Given that the host scanme\&.nmap\&.org would ping exactly the same targets\&. Given that the host scanme\&.nmap\&.org.\" scanme.nmap.org
.\" scanme.nmap.org
is at the IP address 64\&.13\&.134\&.52, the specification is at the IP address 64\&.13\&.134\&.52, the specification
scanme\&.nmap\&.org/16 scanme\&.nmap\&.org/16
would send probes to the 65,536 IP addresses between 64\&.13\&.0\&.0 and 64\&.13\&.255\&.255\&. The smallest allowed value is would send probes to the 65,536 IP addresses between 64\&.13\&.0\&.0 and 64\&.13\&.255\&.255\&. The smallest allowed value is
@@ -392,8 +390,7 @@ TCP is the mode that lets users create and send any kind of TCP packet\&. TCP pa
.RS 4 .RS 4
UDP mode can have two different behaviours\&. Under normal circumstances, it lets users create custom IP/UDP packets\&. However, if Nping is run by a user without raw packet privileges and no changes to the default protocol headers are requested, then Nping enters the unprivileged UDP mode which basically sends UDP packets to the specified target hosts and ports using the UDP mode can have two different behaviours\&. Under normal circumstances, it lets users create custom IP/UDP packets\&. However, if Nping is run by a user without raw packet privileges and no changes to the default protocol headers are requested, then Nping enters the unprivileged UDP mode which basically sends UDP packets to the specified target hosts and ports using the
sendto sendto
system call\&. Note that in this unprivileged mode it is not possible to see low\-level header information of the packets on the wire but only status information about the amount of bytes that are being transmitted and received\&. UDP mode can be used to interact with any UDP\-based server\&. Examples are DNS servers, streaming servers, online gaming servers, and port knocking/single\-packet system call\&. Note that in this unprivileged mode it is not possible to see low\-level header information of the packets on the wire but only status information about the amount of bytes that are being transmitted and received\&. UDP mode can be used to interact with any UDP\-based server\&. Examples are DNS servers, streaming servers, online gaming servers, and port knocking/single\-packet.\" port knocking
.\" port knocking
authorization daemons\&. authorization daemons\&.
.RE .RE
.PP .PP
@@ -519,8 +516,7 @@ Set by an ECN\-Capable sender when it reduces its congestion window (due to a re
.PP .PP
ECN (Explicit Congestion Notification) .\" ECN (TCP flag) ECN (Explicit Congestion Notification) .\" ECN (TCP flag)
.RS 4 .RS 4
During the three\-way handshake it indicates that sender is capable of performing explicit congestion notification\&. Normally it means that a packet with the IP Congestion Experienced flag set was received during normal transmission\&. See RFC 3168 During the three\-way handshake it indicates that sender is capable of performing explicit congestion notification\&. Normally it means that a packet with the IP Congestion Experienced flag set was received during normal transmission\&. See RFC 3168.\" RFC 3168
.\" RFC 3168
for more information\&. for more information\&.
.RE .RE
.PP .PP
@@ -694,8 +690,7 @@ is as with
.\" ICMP types: mnemonics of, in Nping .\" ICMP types: mnemonics of, in Nping
.PP .PP
These identifiers may be used as mnemonics for the ICMP type numbers given to the These identifiers may be used as mnemonics for the ICMP type numbers given to the
\fB\-\-icmp\-type\fR \fB\-\-icmp\-type\fR.\" --icmp-type (Nping option)
.\" --icmp-type (Nping option)
option\&. In general there are three forms of each identifier: the full name (e\&.g\&. option\&. In general there are three forms of each identifier: the full name (e\&.g\&.
destination\-unreachable), the short name (e\&.g\&. destination\-unreachable), the short name (e\&.g\&.
dest\-unr), or the initials (e\&.g\&. dest\-unr), or the initials (e\&.g\&.
@@ -787,8 +782,7 @@ Address Mask Reply (type 18)\&. This message contains a subnet mask and is sent
.PP .PP
traceroute, trace, tc traceroute, trace, tc
.RS 4 .RS 4
Traceroute (type 30)\&. This message is normally sent by an intermediate device when it receives an IP datagram with a traceroute option\&. ICMP Traceroute messages are still experimental, see RFC 1393 Traceroute (type 30)\&. This message is normally sent by an intermediate device when it receives an IP datagram with a traceroute option\&. ICMP Traceroute messages are still experimental, see RFC 1393.\" RFC 1393
.\" RFC 1393
for more information\&. for more information\&.
.RE .RE
.\" .\"
@@ -796,8 +790,7 @@ for more information\&.
.\" ICMP codes: mnemonics of, in Nping .\" ICMP codes: mnemonics of, in Nping
.PP .PP
These identifiers may be used as mnemonics for the ICMP code numbers given to the These identifiers may be used as mnemonics for the ICMP code numbers given to the
\fB\-\-icmp\-code\fR \fB\-\-icmp\-code\fR.\" --icmp-code (Nping option)
.\" --icmp-code (Nping option)
option\&. They are listed by the ICMP type they correspond to\&. option\&. They are listed by the ICMP type they correspond to\&.
.sp .sp
.it 1 an-trap .it 1 an-trap
@@ -899,8 +892,7 @@ Code 15\&. Precedence value in the IP TOS field is lower than the minimum allowe
.PP .PP
redirect\-network, redi\-net, net redirect\-network, redi\-net, net
.RS 4 .RS 4
Code 0\&. Redirect all future datagrams with the same destination network as the original datagram, to the router specified in the Address field\&. The use of this code is prohibited by RFC 1812\&. Code 0\&. Redirect all future datagrams with the same destination network as the original datagram, to the router specified in the Address field\&. The use of this code is prohibited by RFC 1812\&..\" RFC 1812
.\" RFC 1812
.RE .RE
.PP .PP
redirect\-host, redi\-host, host redirect\-host, redi\-host, host
@@ -1026,8 +1018,7 @@ This option sets the Target IP field of the ARP header\&.
.\" ARP types: mnemonics of, in Nping .\" ARP types: mnemonics of, in Nping
.PP .PP
These identifiers may be used as mnemonics for the ARP type numbers given to the These identifiers may be used as mnemonics for the ARP type numbers given to the
\fB\-\-arp\-type\fR \fB\-\-arp\-type\fR.\" --arp-type (Nping option)
.\" --arp-type (Nping option)
option\&. option\&.
.PP .PP
arp\-request, arp, a arp\-request, arp, a
@@ -1042,8 +1033,7 @@ ARP Reply (type 2)\&. An ARP reply is a message that a host sends in response to
.PP .PP
rarp\-request, rarp, r rarp\-request, rarp, r
.RS 4 .RS 4
RARP Requests (type 3)\&. RARP requests are used to translate a link layer address (normally a MAC address) to a network layer address (usually an IP address)\&. Basically a RARP request is a broadcasted message sent by a host that wants to know his own IP address because it doesn\*(Aqt have any\&. It was the first protocol designed to solve the bootstrapping problem\&. However, RARP is now obsolete and DHCP is used instead\&. For more information about RARP see RFC 903\&. RARP Requests (type 3)\&. RARP requests are used to translate a link layer address (normally a MAC address) to a network layer address (usually an IP address)\&. Basically a RARP request is a broadcasted message sent by a host that wants to know his own IP address because it doesn\*(Aqt have any\&. It was the first protocol designed to solve the bootstrapping problem\&. However, RARP is now obsolete and DHCP is used instead\&. For more information about RARP see RFC 903\&..\" RFC 903
.\" RFC 903
.RE .RE
.PP .PP
rarp\-reply, rarp\-rep, rr rarp\-reply, rarp\-rep, rr
@@ -1053,8 +1043,7 @@ RARP Reply (type 4)\&. A RARP reply is a message sent in response to a RARP requ
.PP .PP
drarp\-request, drarp, d drarp\-request, drarp, d
.RS 4 .RS 4
Dynamic RARP Request (type 5)\&. Dynamic RARP is an extension to RARP used to obtain or assign a network layer address from a fixed link layer address\&. DRARP was used mainly in Sun Microsystems platforms in the late 90\*(Aqs but now it\*(Aqs no longer used\&. See RFC 1931 Dynamic RARP Request (type 5)\&. Dynamic RARP is an extension to RARP used to obtain or assign a network layer address from a fixed link layer address\&. DRARP was used mainly in Sun Microsystems platforms in the late 90\*(Aqs but now it\*(Aqs no longer used\&. See RFC 1931.\" RFC 1931
.\" RFC 1931
for more information\&. for more information\&.
.RE .RE
.PP .PP
@@ -1070,8 +1059,7 @@ DRARP Error (type 7)\&. DRARP Error messages are usually sent in response to DRA
.PP .PP
inarp\-request, inarp, i inarp\-request, inarp, i
.RS 4 .RS 4
Inverse ARP Request (type 8)\&. InARP requests are used to translate a link layer address to a network layer address\&. It is similar to RARP request but in this case, the sender of the InARP request wants to know the network layer address of another node, not its own address\&. InARP is mainly used in Frame Relay and ATM networks\&. For more information see RFC 2390\&. Inverse ARP Request (type 8)\&. InARP requests are used to translate a link layer address to a network layer address\&. It is similar to RARP request but in this case, the sender of the InARP request wants to know the network layer address of another node, not its own address\&. InARP is mainly used in Frame Relay and ATM networks\&. For more information see RFC 2390\&..\" RFC 2390
.\" RFC 2390
.RE .RE
.PP .PP
inarp\-reply, inarp\-rep, ir inarp\-reply, inarp\-rep, ir
@@ -1081,8 +1069,7 @@ Inverse ARP Reply (type 9)\&. InARP reply messages are sent in response to InARP
.PP .PP
arp\-nak, an arp\-nak, an
.RS 4 .RS 4
ARP NAK (type 10)\&. ARP NAK messages are an extension to the ATMARP protocol and they are used to improve the robustness of the ATMARP server mechanism\&. With ARP NAK, a client can determine the difference between a catastrophic server failure and an ATMARP table lookup failure\&. See RFC 1577 ARP NAK (type 10)\&. ARP NAK messages are an extension to the ATMARP protocol and they are used to improve the robustness of the ATMARP server mechanism\&. With ARP NAK, a client can determine the difference between a catastrophic server failure and an ATMARP table lookup failure\&. See RFC 1577.\" RFC 1577
.\" RFC 1577
for more information\&. for more information\&.
.RE .RE
.\" .\"
@@ -1103,8 +1090,7 @@ the section called \(lqTARGET SPECIFICATION\(rq\&.
.PP .PP
\fB\-\-tos \fR\fB\fItos\fR\fR (Type of Service) .\" --tos (Nping option) \fB\-\-tos \fR\fB\fItos\fR\fR (Type of Service) .\" --tos (Nping option)
.RS 4 .RS 4
Sets the IP TOS field\&. The TOS field is used to carry information to provide quality of service features\&. It is normally used to support a technique called Differentiated Services\&. See RFC 2474 Sets the IP TOS field\&. The TOS field is used to carry information to provide quality of service features\&. It is normally used to support a technique called Differentiated Services\&. See RFC 2474.\" RFC 2474
.\" RFC 2474
for more information\&. for more information\&.
\fItos\fR \fItos\fR
must be a number in the range [0\(en255]\&. must be a number in the range [0\(en255]\&.
@@ -1200,8 +1186,7 @@ the section called \(lqTARGET SPECIFICATION\(rq\&.
.PP .PP
\fB\-\-flow \fR\fB\fIlabel\fR\fR (Flow Label) .\" --flow (Nping option) \fB\-\-flow \fR\fB\fIlabel\fR\fR (Flow Label) .\" --flow (Nping option)
.RS 4 .RS 4
Sets the IPv6 Flow Label\&. The Flow Label field is 20 bits long and is intended to provide certain quality\-of\-service properties for real\-time datagram delivery\&. However, it has not been widely adopted, and not all routers or endpoints support it\&. Check RFC 2460 Sets the IPv6 Flow Label\&. The Flow Label field is 20 bits long and is intended to provide certain quality\-of\-service properties for real\-time datagram delivery\&. However, it has not been widely adopted, and not all routers or endpoints support it\&. Check RFC 2460.\" RFC 2560
.\" RFC 2560
for more information\&. for more information\&.
\fIlabel\fR \fIlabel\fR
must be an integer in the range [0\(en1048575]\&. must be an integer in the range [0\(en1048575]\&.
@@ -1209,8 +1194,7 @@ must be an integer in the range [0\(en1048575]\&.
.PP .PP
\fB\-\-traffic\-class \fR\fB\fIclass\fR\fR (Traffic Class) .\" --traffic-class (Nping option) \fB\-\-traffic\-class \fR\fB\fIclass\fR\fR (Traffic Class) .\" --traffic-class (Nping option)
.RS 4 .RS 4
Sets the IPv6 Traffic Class\&. This field is similar to the TOS field in IPv4, and is intended to provide the Differentiated Services method, enabling scalable service discrimination in the Internet without the need for per\-flow state and signaling at every hop\&. Check RFC 2474 Sets the IPv6 Traffic Class\&. This field is similar to the TOS field in IPv4, and is intended to provide the Differentiated Services method, enabling scalable service discrimination in the Internet without the need for per\-flow state and signaling at every hop\&. Check RFC 2474.\" RFC 2474
.\" RFC 2474
for more information\&. for more information\&.
\fIclass\fR \fIclass\fR
must be an integer in the range [0\(en255]\&. must be an integer in the range [0\(en255]\&.
@@ -1262,8 +1246,7 @@ the section called \(lqEthernet Types\(rq\&.
.\" Ethernet types: mnemonics of, in Nping .\" Ethernet types: mnemonics of, in Nping
.PP .PP
These identifiers may be used as mnemonics for the Ethertype numbers given to the These identifiers may be used as mnemonics for the Ethertype numbers given to the
\fB\-\-arp\-type\fR \fB\-\-arp\-type\fR.\" --arp-type (Nping option)
.\" --arp-type (Nping option)
option\&. option\&.
.PP .PP
ipv4, ip, 4 ipv4, ip, 4
@@ -1616,8 +1599,7 @@ must be the name of an existing network interface with an assigned IP address\&.
\fB\-\-privileged\fR (Assume that the user is fully privileged) .\" --privileged (Nping option) \fB\-\-privileged\fR (Assume that the user is fully privileged) .\" --privileged (Nping option)
.RS 4 .RS 4
Tells Nping to simply assume that it is privileged enough to perform raw socket sends, packet sniffing, and similar operations that usually require special privileges\&. By default Nping quits if such operations are requested by a user that has no root or administrator privileges\&. This option may be useful on Linux, BSD or similar systems that can be configured to allow unprivileged users to perform raw\-packet transmissions\&. The Tells Nping to simply assume that it is privileged enough to perform raw socket sends, packet sniffing, and similar operations that usually require special privileges\&. By default Nping quits if such operations are requested by a user that has no root or administrator privileges\&. This option may be useful on Linux, BSD or similar systems that can be configured to allow unprivileged users to perform raw\-packet transmissions\&. The
\fBNPING_PRIVILEGED\fR \fBNPING_PRIVILEGED\fR.\" NPING_PRIVILEGED environment variable
.\" NPING_PRIVILEGED environment variable
environment variable may be set as an alternative to using environment variable may be set as an alternative to using
\fB\-\-privileged\fR\&. \fB\-\-privileged\fR\&.
.RE .RE
@@ -1626,8 +1608,7 @@ environment variable may be set as an alternative to using
.RS 4 .RS 4
This option is the opposite of This option is the opposite of
\fB\-\-privileged\fR\&. It tells Nping to treat the user as lacking network raw socket and sniffing privileges\&. This is useful for testing, debugging, or when the raw network functionality of your operating system is somehow broken\&. The \fB\-\-privileged\fR\&. It tells Nping to treat the user as lacking network raw socket and sniffing privileges\&. This is useful for testing, debugging, or when the raw network functionality of your operating system is somehow broken\&. The
\fBNPING_UNPRIVILEGED\fR \fBNPING_UNPRIVILEGED\fR.\" NPING_UNPRIVILEGED environment variable
.\" NPING_UNPRIVILEGED environment variable
environment variable may be set as an alternative to using environment variable may be set as an alternative to using
\fB\-\-unprivileged\fR\&. \fB\-\-unprivileged\fR\&.
.RE .RE
@@ -1646,8 +1627,7 @@ option\&.
.PP .PP
\fB\-\-bpf\-filter \fR\fB\fIfilter spec\fR\fR \fB\-\-filter \fR\fB\fIfilter spec\fR\fR (Set custom BPF filter) .\" --bpf-filter (Nping option) .\" --filter (Nping option) \fB\-\-bpf\-filter \fR\fB\fIfilter spec\fR\fR \fB\-\-filter \fR\fB\fIfilter spec\fR\fR (Set custom BPF filter) .\" --bpf-filter (Nping option) .\" --filter (Nping option)
.RS 4 .RS 4
This option lets you use a custom BPF filter\&. By default Nping chooses a filter that is intended to capture most common responses to the particular probes that are sent\&. For example, when sending TCP packets, the filter is set to capture packets whose destination port matches the probe\*(Aqs source port or ICMP error messages that may be generated by the target or any intermediate device as a result of the probe\&. If for some reason you expect strange packets in response to sent probes or you just want to sniff a particular kind of traffic, you can specify a custom filter using the BPF syntax used by tools like tcpdump\&. This option lets you use a custom BPF filter\&. By default Nping chooses a filter that is intended to capture most common responses to the particular probes that are sent\&. For example, when sending TCP packets, the filter is set to capture packets whose destination port matches the probe\*(Aqs source port or ICMP error messages that may be generated by the target or any intermediate device as a result of the probe\&. If for some reason you expect strange packets in response to sent probes or you just want to sniff a particular kind of traffic, you can specify a custom filter using the BPF syntax used by tools like tcpdump\&..\" tcpdump
.\" tcpdump
See the documentation at See the documentation at
\m[blue]\fB\%http://www.tcpdump.org/\fR\m[] \m[blue]\fB\%http://www.tcpdump.org/\fR\m[]
for more information\&. for more information\&.
@@ -1782,8 +1762,7 @@ Like level 3 but also displays messages only a real Nping freak would want to se
.PP .PP
Level 5 Level 5
.RS 4 .RS 4
Like level 4 but it enables basic debug information related to external libraries like Nsock\&. Like level 4 but it enables basic debug information related to external libraries like Nsock\&..\" Nsock
.\" Nsock
.RE .RE
.PP .PP
Level 6 Level 6
@@ -1800,8 +1779,7 @@ Like its author, Nping isn\*(Aqt perfect\&. But you can help make it better by s
or at Google\&. Also try browsing the or at Google\&. Also try browsing the
nmap\-dev nmap\-dev
archives at archives at
\m[blue]\fB\%http://seclists.org/\fR\m[] \m[blue]\fB\%http://seclists.org/\fR\m[].\" nmap-dev mailing list
.\" nmap-dev mailing list
Read this full manual page as well\&. If nothing comes out of this, mail a bug report to Read this full manual page as well\&. If nothing comes out of this, mail a bug report to
<dev@nmap\&.org>\&. Please include everything you have learned about the problem, as well as what version of Nping you are running and what operating system version it is running on\&. Problem reports and Nping usage questions sent to <dev@nmap\&.org>\&. Please include everything you have learned about the problem, as well as what version of Nping you are running and what operating system version it is running on\&. Problem reports and Nping usage questions sent to
<dev@nmap\&.org> <dev@nmap\&.org>