mirror of
https://github.com/nmap/nmap.git
synced 2025-12-22 15:39:03 +00:00
Update version number to 5.61TEST1
This commit is contained in:
63
docs/nmap.1
63
docs/nmap.1
@@ -2,12 +2,12 @@
|
|||||||
.\" Title: nmap
|
.\" Title: nmap
|
||||||
.\" Author: [see the "Author" section]
|
.\" Author: [see the "Author" section]
|
||||||
.\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
|
.\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
|
||||||
.\" Date: 08/24/2011
|
.\" Date: 09/19/2011
|
||||||
.\" Manual: Nmap Reference Guide
|
.\" Manual: Nmap Reference Guide
|
||||||
.\" Source: Nmap
|
.\" Source: Nmap
|
||||||
.\" Language: English
|
.\" Language: English
|
||||||
.\"
|
.\"
|
||||||
.TH "NMAP" "1" "08/24/2011" "Nmap" "Nmap Reference Guide"
|
.TH "NMAP" "1" "09/19/2011" "Nmap" "Nmap Reference Guide"
|
||||||
.\" -----------------------------------------------------------------
|
.\" -----------------------------------------------------------------
|
||||||
.\" * Define some portability stuff
|
.\" * Define some portability stuff
|
||||||
.\" -----------------------------------------------------------------
|
.\" -----------------------------------------------------------------
|
||||||
@@ -77,35 +77,32 @@ for faster execution; and then the two target hostnames\&.
|
|||||||
.nf
|
.nf
|
||||||
# \fBnmap \-A \-T4 scanme\&.nmap\&.org\fR
|
# \fBnmap \-A \-T4 scanme\&.nmap\&.org\fR
|
||||||
|
|
||||||
Nmap scan report for scanme\&.nmap\&.org (64\&.13\&.134\&.52)
|
Nmap scan report for scanme\&.nmap\&.org (74\&.207\&.244\&.221)
|
||||||
Host is up (0\&.045s latency)\&.
|
Host is up (0\&.029s latency)\&.
|
||||||
Not shown: 993 filtered ports
|
rDNS record for 74\&.207\&.244\&.221: li86\-221\&.members\&.linode\&.com
|
||||||
|
Not shown: 995 closed ports
|
||||||
PORT STATE SERVICE VERSION
|
PORT STATE SERVICE VERSION
|
||||||
22/tcp open ssh OpenSSH 4\&.3 (protocol 2\&.0)
|
22/tcp open ssh OpenSSH 5\&.3p1 Debian 3ubuntu7 (protocol 2\&.0)
|
||||||
| ssh\-hostkey: 1024 60:ac:4d:51:b1:cd:85:09:12:16:92:76:1d:5d:27:6e (DSA)
|
| ssh\-hostkey: 1024 8d:60:f1:7c:ca:b7:3d:0a:d6:67:54:9d:69:d9:b9:dd (DSA)
|
||||||
|_2048 2c:22:75:60:4b:c3:3b:18:a2:97:2c:96:7e:28:dc:dd (RSA)
|
|_2048 79:f8:09:ac:d4:e2:32:42:10:49:d3:bd:20:82:85:ec (RSA)
|
||||||
25/tcp closed smtp
|
80/tcp open http Apache httpd 2\&.2\&.14 ((Ubuntu))
|
||||||
53/tcp open domain
|
|_http\-title: Go ahead and ScanMe!
|
||||||
70/tcp closed gopher
|
646/tcp filtered ldp
|
||||||
80/tcp open http Apache httpd 2\&.2\&.3 ((CentOS))
|
1720/tcp filtered H\&.323/Q\&.931
|
||||||
|_html\-title: Go ahead and ScanMe!
|
9929/tcp open nping\-echo Nping echo
|
||||||
| http\-methods: Potentially risky methods: TRACE
|
|
||||||
|_See http://nmap\&.org/nsedoc/scripts/http\-methods\&.html
|
|
||||||
113/tcp closed auth
|
|
||||||
31337/tcp closed Elite
|
|
||||||
Device type: general purpose
|
Device type: general purpose
|
||||||
Running: Linux 2\&.6\&.X
|
Running: Linux 2\&.6\&.X
|
||||||
OS details: Linux 2\&.6\&.13 \- 2\&.6\&.31, Linux 2\&.6\&.18
|
OS CPE: cpe:/o:linux:kernel:2\&.6\&.39
|
||||||
Network Distance: 13 hops
|
OS details: Linux 2\&.6\&.39
|
||||||
|
Network Distance: 11 hops
|
||||||
|
Service Info: OS: Linux; CPE: cpe:/o:linux:kernel
|
||||||
|
|
||||||
TRACEROUTE (using port 80/tcp)
|
TRACEROUTE (using port 53/tcp)
|
||||||
HOP RTT ADDRESS
|
HOP RTT ADDRESS
|
||||||
[Cut first 10 hops for brevity]
|
[Cut first 10 hops for brevity]
|
||||||
11 80\&.33 ms layer42\&.car2\&.sanjose2\&.level3\&.net (4\&.59\&.4\&.78)
|
11 17\&.65 ms li86\-221\&.members\&.linode\&.com (74\&.207\&.244\&.221)
|
||||||
12 137\&.52 ms xe6\-2\&.core1\&.svk\&.layer42\&.net (69\&.36\&.239\&.221)
|
|
||||||
13 44\&.15 ms scanme\&.nmap\&.org (64\&.13\&.134\&.52)
|
|
||||||
|
|
||||||
Nmap done: 1 IP address (1 host up) scanned in 22\&.19 seconds
|
Nmap done: 1 IP address (1 host up) scanned in 14\&.40 seconds
|
||||||
.fi
|
.fi
|
||||||
.if n \{\
|
.if n \{\
|
||||||
.RE
|
.RE
|
||||||
@@ -126,7 +123,7 @@ This options summary is printed when Nmap is run with no arguments, and the late
|
|||||||
.RS 4
|
.RS 4
|
||||||
.\}
|
.\}
|
||||||
.nf
|
.nf
|
||||||
Nmap 5\&.59BETA3 ( http://nmap\&.org )
|
Nmap 5\&.61TEST1 ( http://nmap\&.org )
|
||||||
Usage: nmap [Scan Type(s)] [Options] {target specification}
|
Usage: nmap [Scan Type(s)] [Options] {target specification}
|
||||||
TARGET SPECIFICATION:
|
TARGET SPECIFICATION:
|
||||||
Can pass hostnames, IP addresses, networks, etc\&.
|
Can pass hostnames, IP addresses, networks, etc\&.
|
||||||
@@ -281,6 +278,14 @@ will perform an Internet\-wide scan for all IP addresses ending in 13\&.37\&. Th
|
|||||||
.\" IPv6
|
.\" IPv6
|
||||||
.PP
|
.PP
|
||||||
IPv6 addresses can only be specified by their fully qualified IPv6 address or hostname\&. CIDR and octet ranges aren\*(Aqt yet supported for IPv6\&.
|
IPv6 addresses can only be specified by their fully qualified IPv6 address or hostname\&. CIDR and octet ranges aren\*(Aqt yet supported for IPv6\&.
|
||||||
|
.\" link-local IPv6 address
|
||||||
|
.\" IPv6 address: link-local
|
||||||
|
.\" zone ID (IPv6 address)
|
||||||
|
.PP
|
||||||
|
IPv6 addresses with non\-global scope need to have a zone ID suffix\&. On Unix systems, this is a percent sign followed by an interface name; a complete address might be
|
||||||
|
fe80::a8bb:ccff:fedd:eeff%eth0\&. On Windows, use an interface index number in place of an interface name:
|
||||||
|
fe80::a8bb:ccff:fedd:eeff%1\&. You can see a list of interface indexes by running the command
|
||||||
|
\fBnetsh\&.exe interface ipv6 show interface\fR\&.
|
||||||
.PP
|
.PP
|
||||||
Nmap accepts multiple host specifications on the command line, and they don\*(Aqt need to be the same type\&. The command
|
Nmap accepts multiple host specifications on the command line, and they don\*(Aqt need to be the same type\&. The command
|
||||||
\fBnmap scanme\&.nmap\&.org 192\&.168\&.0\&.0/8 10\&.0\&.0,1,3\-7\&.\-\fR
|
\fBnmap scanme\&.nmap\&.org 192\&.168\&.0\&.0/8 10\&.0\&.0,1,3\-7\&.\-\fR
|
||||||
@@ -1053,7 +1058,8 @@ Even if Nmap is right, and the hypothetical server above is running SMTP, HTTP,
|
|||||||
.PP
|
.PP
|
||||||
After TCP and/or UDP ports are discovered using one of the other scan methods, version detection interrogates those ports to determine more about what is actually running\&. The
|
After TCP and/or UDP ports are discovered using one of the other scan methods, version detection interrogates those ports to determine more about what is actually running\&. The
|
||||||
nmap\-service\-probes.\" nmap-service-probes
|
nmap\-service\-probes.\" nmap-service-probes
|
||||||
database contains probes for querying various services and match expressions to recognize and parse responses\&. Nmap tries to determine the service protocol (e\&.g\&. FTP, SSH, Telnet, HTTP), the application name (e\&.g\&. ISC BIND, Apache httpd, Solaris telnetd), the version number, hostname, device type (e\&.g\&. printer, router), the OS family (e\&.g\&. Windows, Linux) and sometimes miscellaneous details like whether an X server is open to connections, the SSH protocol version, or the KaZaA user name)\&. Of course, most services don\*(Aqt provide all of this information\&. If Nmap was compiled with OpenSSL support, it will connect to SSL servers to deduce the service listening behind that encryption layer\&..\" SSL: in version detection
|
database contains probes for querying various services and match expressions to recognize and parse responses\&. Nmap tries to determine the service protocol (e\&.g\&. FTP, SSH, Telnet, HTTP), the application name (e\&.g\&. ISC BIND, Apache httpd, Solaris telnetd), the version number, hostname, device type (e\&.g\&. printer, router), the OS family (e\&.g\&. Windows, Linux)\&. When possible, Nmap also gets the Common Platform Enumeration (CPE).\" Common Platform Enumeration: service
|
||||||
|
representation of this information\&. Sometimes miscellaneous details like whether an X server is open to connections, the SSH protocol version, or the KaZaA user name, are available\&. Of course, most services don\*(Aqt provide all of this information\&. If Nmap was compiled with OpenSSL support, it will connect to SSL servers to deduce the service listening behind that encryption layer\&..\" SSL: in version detection
|
||||||
Some UDP ports are left in the
|
Some UDP ports are left in the
|
||||||
open|filtered
|
open|filtered
|
||||||
state after a UDP port scan is unable to determine whether the port is open or filtered\&. Version detection will try to elicit a response from these ports (just as it does with open ports), and change the state to open if it succeeds\&.
|
state after a UDP port scan is unable to determine whether the port is open or filtered\&. Version detection will try to elicit a response from these ports (just as it does with open ports), and change the state to open if it succeeds\&.
|
||||||
@@ -1125,10 +1131,13 @@ This causes Nmap to print out extensive debugging info about what version scanni
|
|||||||
.\"
|
.\"
|
||||||
.SH "OS DETECTION"
|
.SH "OS DETECTION"
|
||||||
.\" OS detection
|
.\" OS detection
|
||||||
|
.\" CPE
|
||||||
.PP
|
.PP
|
||||||
One of Nmap\*(Aqs best\-known features is remote OS detection using TCP/IP stack fingerprinting\&. Nmap sends a series of TCP and UDP packets to the remote host and examines practically every bit in the responses\&. After performing dozens of tests such as TCP ISN sampling, TCP options support and ordering, IP ID sampling, and the initial window size check, Nmap compares the results to its
|
One of Nmap\*(Aqs best\-known features is remote OS detection using TCP/IP stack fingerprinting\&. Nmap sends a series of TCP and UDP packets to the remote host and examines practically every bit in the responses\&. After performing dozens of tests such as TCP ISN sampling, TCP options support and ordering, IP ID sampling, and the initial window size check, Nmap compares the results to its
|
||||||
nmap\-os\-db.\" nmap-os-db
|
nmap\-os\-db.\" nmap-os-db
|
||||||
database of more than 2,600 known OS fingerprints and prints out the OS details if there is a match\&. Each fingerprint includes a freeform textual description of the OS, and a classification which provides the vendor name (e\&.g\&. Sun), underlying OS (e\&.g\&. Solaris), OS generation (e\&.g\&. 10), and device type (general purpose, router, switch, game console, etc)\&.
|
database of more than 2,600 known OS fingerprints and prints out the OS details if there is a match\&. Each fingerprint includes a freeform textual description of the OS, and a classification which provides the vendor name (e\&.g\&. Sun), underlying OS (e\&.g\&. Solaris), OS generation (e\&.g\&. 10), and device type (general purpose, router, switch, game console, etc)\&. Most fingerprints also have a Common Platform Enumeration (CPE).\" Common Platform Enumeration: operating system
|
||||||
|
representation, like
|
||||||
|
cpe:/o:linux:kernel:2\&.6\&.
|
||||||
.PP
|
.PP
|
||||||
If Nmap is unable to guess the OS of a machine, and conditions are good (e\&.g\&. at least one open port and one closed port were found), Nmap will provide a URL you can use to submit the fingerprint if you know (for sure) the OS running on the machine\&. By doing this you contribute to the pool of operating systems known to Nmap and thus it will be more accurate for everyone\&.
|
If Nmap is unable to guess the OS of a machine, and conditions are good (e\&.g\&. at least one open port and one closed port were found), Nmap will provide a URL you can use to submit the fingerprint if you know (for sure) the OS running on the machine\&. By doing this you contribute to the pool of operating systems known to Nmap and thus it will be more accurate for everyone\&.
|
||||||
.PP
|
.PP
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
Nmap 5.59BETA3 ( http://nmap.org )
|
Nmap 5.61TEST1 ( http://nmap.org )
|
||||||
Usage: nmap [Scan Type(s)] [Options] {target specification}
|
Usage: nmap [Scan Type(s)] [Options] {target specification}
|
||||||
TARGET SPECIFICATION:
|
TARGET SPECIFICATION:
|
||||||
Can pass hostnames, IP addresses, networks, etc.
|
Can pass hostnames, IP addresses, networks, etc.
|
||||||
|
|||||||
@@ -2,12 +2,12 @@
|
|||||||
.\" Title: zenmap
|
.\" Title: zenmap
|
||||||
.\" Author: [see the "Authors" section]
|
.\" Author: [see the "Authors" section]
|
||||||
.\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
|
.\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
|
||||||
.\" Date: 08/24/2011
|
.\" Date: 09/19/2011
|
||||||
.\" Manual: Zenmap Reference Guide
|
.\" Manual: Zenmap Reference Guide
|
||||||
.\" Source: Zenmap
|
.\" Source: Zenmap
|
||||||
.\" Language: English
|
.\" Language: English
|
||||||
.\"
|
.\"
|
||||||
.TH "ZENMAP" "1" "08/24/2011" "Zenmap" "Zenmap Reference Guide"
|
.TH "ZENMAP" "1" "09/19/2011" "Zenmap" "Zenmap Reference Guide"
|
||||||
.\" -----------------------------------------------------------------
|
.\" -----------------------------------------------------------------
|
||||||
.\" * Define some portability stuff
|
.\" * Define some portability stuff
|
||||||
.\" -----------------------------------------------------------------
|
.\" -----------------------------------------------------------------
|
||||||
|
|||||||
@@ -2,12 +2,12 @@
|
|||||||
.\" Title: ndiff
|
.\" Title: ndiff
|
||||||
.\" Author: [see the "Authors" section]
|
.\" Author: [see the "Authors" section]
|
||||||
.\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
|
.\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
|
||||||
.\" Date: 08/24/2011
|
.\" Date: 09/19/2011
|
||||||
.\" Manual: User Commands
|
.\" Manual: User Commands
|
||||||
.\" Source: Ndiff
|
.\" Source: Ndiff
|
||||||
.\" Language: English
|
.\" Language: English
|
||||||
.\"
|
.\"
|
||||||
.TH "NDIFF" "1" "08/24/2011" "Ndiff" "User Commands"
|
.TH "NDIFF" "1" "09/19/2011" "Ndiff" "User Commands"
|
||||||
.\" -----------------------------------------------------------------
|
.\" -----------------------------------------------------------------
|
||||||
.\" * Define some portability stuff
|
.\" * Define some portability stuff
|
||||||
.\" -----------------------------------------------------------------
|
.\" -----------------------------------------------------------------
|
||||||
|
|||||||
Reference in New Issue
Block a user