From 6ed56140bde06bf2bb29fb44c3dde67a6a8dc22d Mon Sep 17 00:00:00 2001 From: fyodor Date: Mon, 19 Sep 2011 21:52:08 +0000 Subject: [PATCH] Update version number to 5.61TEST1 --- docs/nmap.1 | 67 +++++++++++++++++++++++++-------------------- docs/nmap.usage.txt | 2 +- docs/zenmap.1 | 4 +-- ndiff/docs/ndiff.1 | 4 +-- 4 files changed, 43 insertions(+), 34 deletions(-) diff --git a/docs/nmap.1 b/docs/nmap.1 index b6cb50301..41c7214e3 100644 --- a/docs/nmap.1 +++ b/docs/nmap.1 @@ -2,12 +2,12 @@ .\" Title: nmap .\" Author: [see the "Author" section] .\" Generator: DocBook XSL Stylesheets v1.76.1 -.\" Date: 08/24/2011 +.\" Date: 09/19/2011 .\" Manual: Nmap Reference Guide .\" Source: Nmap .\" Language: English .\" -.TH "NMAP" "1" "08/24/2011" "Nmap" "Nmap Reference Guide" +.TH "NMAP" "1" "09/19/2011" "Nmap" "Nmap Reference Guide" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- @@ -77,35 +77,32 @@ for faster execution; and then the two target hostnames\&. .nf # \fBnmap \-A \-T4 scanme\&.nmap\&.org\fR -Nmap scan report for scanme\&.nmap\&.org (64\&.13\&.134\&.52) -Host is up (0\&.045s latency)\&. -Not shown: 993 filtered ports -PORT STATE SERVICE VERSION -22/tcp open ssh OpenSSH 4\&.3 (protocol 2\&.0) -| ssh\-hostkey: 1024 60:ac:4d:51:b1:cd:85:09:12:16:92:76:1d:5d:27:6e (DSA) -|_2048 2c:22:75:60:4b:c3:3b:18:a2:97:2c:96:7e:28:dc:dd (RSA) -25/tcp closed smtp -53/tcp open domain -70/tcp closed gopher -80/tcp open http Apache httpd 2\&.2\&.3 ((CentOS)) -|_html\-title: Go ahead and ScanMe! -| http\-methods: Potentially risky methods: TRACE -|_See http://nmap\&.org/nsedoc/scripts/http\-methods\&.html -113/tcp closed auth -31337/tcp closed Elite +Nmap scan report for scanme\&.nmap\&.org (74\&.207\&.244\&.221) +Host is up (0\&.029s latency)\&. +rDNS record for 74\&.207\&.244\&.221: li86\-221\&.members\&.linode\&.com +Not shown: 995 closed ports +PORT STATE SERVICE VERSION +22/tcp open ssh OpenSSH 5\&.3p1 Debian 3ubuntu7 (protocol 2\&.0) +| ssh\-hostkey: 1024 8d:60:f1:7c:ca:b7:3d:0a:d6:67:54:9d:69:d9:b9:dd (DSA) +|_2048 79:f8:09:ac:d4:e2:32:42:10:49:d3:bd:20:82:85:ec (RSA) +80/tcp open http Apache httpd 2\&.2\&.14 ((Ubuntu)) +|_http\-title: Go ahead and ScanMe! +646/tcp filtered ldp +1720/tcp filtered H\&.323/Q\&.931 +9929/tcp open nping\-echo Nping echo Device type: general purpose Running: Linux 2\&.6\&.X -OS details: Linux 2\&.6\&.13 \- 2\&.6\&.31, Linux 2\&.6\&.18 -Network Distance: 13 hops +OS CPE: cpe:/o:linux:kernel:2\&.6\&.39 +OS details: Linux 2\&.6\&.39 +Network Distance: 11 hops +Service Info: OS: Linux; CPE: cpe:/o:linux:kernel -TRACEROUTE (using port 80/tcp) -HOP RTT ADDRESS +TRACEROUTE (using port 53/tcp) +HOP RTT ADDRESS [Cut first 10 hops for brevity] -11 80\&.33 ms layer42\&.car2\&.sanjose2\&.level3\&.net (4\&.59\&.4\&.78) -12 137\&.52 ms xe6\-2\&.core1\&.svk\&.layer42\&.net (69\&.36\&.239\&.221) -13 44\&.15 ms scanme\&.nmap\&.org (64\&.13\&.134\&.52) +11 17\&.65 ms li86\-221\&.members\&.linode\&.com (74\&.207\&.244\&.221) -Nmap done: 1 IP address (1 host up) scanned in 22\&.19 seconds +Nmap done: 1 IP address (1 host up) scanned in 14\&.40 seconds .fi .if n \{\ .RE @@ -126,7 +123,7 @@ This options summary is printed when Nmap is run with no arguments, and the late .RS 4 .\} .nf -Nmap 5\&.59BETA3 ( http://nmap\&.org ) +Nmap 5\&.61TEST1 ( http://nmap\&.org ) Usage: nmap [Scan Type(s)] [Options] {target specification} TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc\&. @@ -281,6 +278,14 @@ will perform an Internet\-wide scan for all IP addresses ending in 13\&.37\&. Th .\" IPv6 .PP IPv6 addresses can only be specified by their fully qualified IPv6 address or hostname\&. CIDR and octet ranges aren\*(Aqt yet supported for IPv6\&. +.\" link-local IPv6 address +.\" IPv6 address: link-local +.\" zone ID (IPv6 address) +.PP +IPv6 addresses with non\-global scope need to have a zone ID suffix\&. On Unix systems, this is a percent sign followed by an interface name; a complete address might be +fe80::a8bb:ccff:fedd:eeff%eth0\&. On Windows, use an interface index number in place of an interface name: +fe80::a8bb:ccff:fedd:eeff%1\&. You can see a list of interface indexes by running the command +\fBnetsh\&.exe interface ipv6 show interface\fR\&. .PP Nmap accepts multiple host specifications on the command line, and they don\*(Aqt need to be the same type\&. The command \fBnmap scanme\&.nmap\&.org 192\&.168\&.0\&.0/8 10\&.0\&.0,1,3\-7\&.\-\fR @@ -1053,7 +1058,8 @@ Even if Nmap is right, and the hypothetical server above is running SMTP, HTTP, .PP After TCP and/or UDP ports are discovered using one of the other scan methods, version detection interrogates those ports to determine more about what is actually running\&. The nmap\-service\-probes.\" nmap-service-probes -database contains probes for querying various services and match expressions to recognize and parse responses\&. Nmap tries to determine the service protocol (e\&.g\&. FTP, SSH, Telnet, HTTP), the application name (e\&.g\&. ISC BIND, Apache httpd, Solaris telnetd), the version number, hostname, device type (e\&.g\&. printer, router), the OS family (e\&.g\&. Windows, Linux) and sometimes miscellaneous details like whether an X server is open to connections, the SSH protocol version, or the KaZaA user name)\&. Of course, most services don\*(Aqt provide all of this information\&. If Nmap was compiled with OpenSSL support, it will connect to SSL servers to deduce the service listening behind that encryption layer\&..\" SSL: in version detection +database contains probes for querying various services and match expressions to recognize and parse responses\&. Nmap tries to determine the service protocol (e\&.g\&. FTP, SSH, Telnet, HTTP), the application name (e\&.g\&. ISC BIND, Apache httpd, Solaris telnetd), the version number, hostname, device type (e\&.g\&. printer, router), the OS family (e\&.g\&. Windows, Linux)\&. When possible, Nmap also gets the Common Platform Enumeration (CPE).\" Common Platform Enumeration: service +representation of this information\&. Sometimes miscellaneous details like whether an X server is open to connections, the SSH protocol version, or the KaZaA user name, are available\&. Of course, most services don\*(Aqt provide all of this information\&. If Nmap was compiled with OpenSSL support, it will connect to SSL servers to deduce the service listening behind that encryption layer\&..\" SSL: in version detection Some UDP ports are left in the open|filtered state after a UDP port scan is unable to determine whether the port is open or filtered\&. Version detection will try to elicit a response from these ports (just as it does with open ports), and change the state to open if it succeeds\&. @@ -1125,10 +1131,13 @@ This causes Nmap to print out extensive debugging info about what version scanni .\" .SH "OS DETECTION" .\" OS detection +.\" CPE .PP One of Nmap\*(Aqs best\-known features is remote OS detection using TCP/IP stack fingerprinting\&. Nmap sends a series of TCP and UDP packets to the remote host and examines practically every bit in the responses\&. After performing dozens of tests such as TCP ISN sampling, TCP options support and ordering, IP ID sampling, and the initial window size check, Nmap compares the results to its nmap\-os\-db.\" nmap-os-db -database of more than 2,600 known OS fingerprints and prints out the OS details if there is a match\&. Each fingerprint includes a freeform textual description of the OS, and a classification which provides the vendor name (e\&.g\&. Sun), underlying OS (e\&.g\&. Solaris), OS generation (e\&.g\&. 10), and device type (general purpose, router, switch, game console, etc)\&. +database of more than 2,600 known OS fingerprints and prints out the OS details if there is a match\&. Each fingerprint includes a freeform textual description of the OS, and a classification which provides the vendor name (e\&.g\&. Sun), underlying OS (e\&.g\&. Solaris), OS generation (e\&.g\&. 10), and device type (general purpose, router, switch, game console, etc)\&. Most fingerprints also have a Common Platform Enumeration (CPE).\" Common Platform Enumeration: operating system +representation, like +cpe:/o:linux:kernel:2\&.6\&. .PP If Nmap is unable to guess the OS of a machine, and conditions are good (e\&.g\&. at least one open port and one closed port were found), Nmap will provide a URL you can use to submit the fingerprint if you know (for sure) the OS running on the machine\&. By doing this you contribute to the pool of operating systems known to Nmap and thus it will be more accurate for everyone\&. .PP diff --git a/docs/nmap.usage.txt b/docs/nmap.usage.txt index f665a656e..10dd7c80c 100644 --- a/docs/nmap.usage.txt +++ b/docs/nmap.usage.txt @@ -1,4 +1,4 @@ -Nmap 5.59BETA3 ( http://nmap.org ) +Nmap 5.61TEST1 ( http://nmap.org ) Usage: nmap [Scan Type(s)] [Options] {target specification} TARGET SPECIFICATION: Can pass hostnames, IP addresses, networks, etc. diff --git a/docs/zenmap.1 b/docs/zenmap.1 index d9245cbd6..02831530d 100644 --- a/docs/zenmap.1 +++ b/docs/zenmap.1 @@ -2,12 +2,12 @@ .\" Title: zenmap .\" Author: [see the "Authors" section] .\" Generator: DocBook XSL Stylesheets v1.76.1 -.\" Date: 08/24/2011 +.\" Date: 09/19/2011 .\" Manual: Zenmap Reference Guide .\" Source: Zenmap .\" Language: English .\" -.TH "ZENMAP" "1" "08/24/2011" "Zenmap" "Zenmap Reference Guide" +.TH "ZENMAP" "1" "09/19/2011" "Zenmap" "Zenmap Reference Guide" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- diff --git a/ndiff/docs/ndiff.1 b/ndiff/docs/ndiff.1 index 662c0b6c4..7cdc90abc 100644 --- a/ndiff/docs/ndiff.1 +++ b/ndiff/docs/ndiff.1 @@ -2,12 +2,12 @@ .\" Title: ndiff .\" Author: [see the "Authors" section] .\" Generator: DocBook XSL Stylesheets v1.76.1 -.\" Date: 08/24/2011 +.\" Date: 09/19/2011 .\" Manual: User Commands .\" Source: Ndiff .\" Language: English .\" -.TH "NDIFF" "1" "08/24/2011" "Ndiff" "User Commands" +.TH "NDIFF" "1" "09/19/2011" "Ndiff" "User Commands" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" -----------------------------------------------------------------