mirror of
https://github.com/nmap/nmap.git
synced 2025-12-22 07:29:01 +00:00
Update version number to 5.61TEST1
This commit is contained in:
67
docs/nmap.1
67
docs/nmap.1
@@ -2,12 +2,12 @@
|
||||
.\" Title: nmap
|
||||
.\" Author: [see the "Author" section]
|
||||
.\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
|
||||
.\" Date: 08/24/2011
|
||||
.\" Date: 09/19/2011
|
||||
.\" Manual: Nmap Reference Guide
|
||||
.\" Source: Nmap
|
||||
.\" Language: English
|
||||
.\"
|
||||
.TH "NMAP" "1" "08/24/2011" "Nmap" "Nmap Reference Guide"
|
||||
.TH "NMAP" "1" "09/19/2011" "Nmap" "Nmap Reference Guide"
|
||||
.\" -----------------------------------------------------------------
|
||||
.\" * Define some portability stuff
|
||||
.\" -----------------------------------------------------------------
|
||||
@@ -77,35 +77,32 @@ for faster execution; and then the two target hostnames\&.
|
||||
.nf
|
||||
# \fBnmap \-A \-T4 scanme\&.nmap\&.org\fR
|
||||
|
||||
Nmap scan report for scanme\&.nmap\&.org (64\&.13\&.134\&.52)
|
||||
Host is up (0\&.045s latency)\&.
|
||||
Not shown: 993 filtered ports
|
||||
PORT STATE SERVICE VERSION
|
||||
22/tcp open ssh OpenSSH 4\&.3 (protocol 2\&.0)
|
||||
| ssh\-hostkey: 1024 60:ac:4d:51:b1:cd:85:09:12:16:92:76:1d:5d:27:6e (DSA)
|
||||
|_2048 2c:22:75:60:4b:c3:3b:18:a2:97:2c:96:7e:28:dc:dd (RSA)
|
||||
25/tcp closed smtp
|
||||
53/tcp open domain
|
||||
70/tcp closed gopher
|
||||
80/tcp open http Apache httpd 2\&.2\&.3 ((CentOS))
|
||||
|_html\-title: Go ahead and ScanMe!
|
||||
| http\-methods: Potentially risky methods: TRACE
|
||||
|_See http://nmap\&.org/nsedoc/scripts/http\-methods\&.html
|
||||
113/tcp closed auth
|
||||
31337/tcp closed Elite
|
||||
Nmap scan report for scanme\&.nmap\&.org (74\&.207\&.244\&.221)
|
||||
Host is up (0\&.029s latency)\&.
|
||||
rDNS record for 74\&.207\&.244\&.221: li86\-221\&.members\&.linode\&.com
|
||||
Not shown: 995 closed ports
|
||||
PORT STATE SERVICE VERSION
|
||||
22/tcp open ssh OpenSSH 5\&.3p1 Debian 3ubuntu7 (protocol 2\&.0)
|
||||
| ssh\-hostkey: 1024 8d:60:f1:7c:ca:b7:3d:0a:d6:67:54:9d:69:d9:b9:dd (DSA)
|
||||
|_2048 79:f8:09:ac:d4:e2:32:42:10:49:d3:bd:20:82:85:ec (RSA)
|
||||
80/tcp open http Apache httpd 2\&.2\&.14 ((Ubuntu))
|
||||
|_http\-title: Go ahead and ScanMe!
|
||||
646/tcp filtered ldp
|
||||
1720/tcp filtered H\&.323/Q\&.931
|
||||
9929/tcp open nping\-echo Nping echo
|
||||
Device type: general purpose
|
||||
Running: Linux 2\&.6\&.X
|
||||
OS details: Linux 2\&.6\&.13 \- 2\&.6\&.31, Linux 2\&.6\&.18
|
||||
Network Distance: 13 hops
|
||||
OS CPE: cpe:/o:linux:kernel:2\&.6\&.39
|
||||
OS details: Linux 2\&.6\&.39
|
||||
Network Distance: 11 hops
|
||||
Service Info: OS: Linux; CPE: cpe:/o:linux:kernel
|
||||
|
||||
TRACEROUTE (using port 80/tcp)
|
||||
HOP RTT ADDRESS
|
||||
TRACEROUTE (using port 53/tcp)
|
||||
HOP RTT ADDRESS
|
||||
[Cut first 10 hops for brevity]
|
||||
11 80\&.33 ms layer42\&.car2\&.sanjose2\&.level3\&.net (4\&.59\&.4\&.78)
|
||||
12 137\&.52 ms xe6\-2\&.core1\&.svk\&.layer42\&.net (69\&.36\&.239\&.221)
|
||||
13 44\&.15 ms scanme\&.nmap\&.org (64\&.13\&.134\&.52)
|
||||
11 17\&.65 ms li86\-221\&.members\&.linode\&.com (74\&.207\&.244\&.221)
|
||||
|
||||
Nmap done: 1 IP address (1 host up) scanned in 22\&.19 seconds
|
||||
Nmap done: 1 IP address (1 host up) scanned in 14\&.40 seconds
|
||||
.fi
|
||||
.if n \{\
|
||||
.RE
|
||||
@@ -126,7 +123,7 @@ This options summary is printed when Nmap is run with no arguments, and the late
|
||||
.RS 4
|
||||
.\}
|
||||
.nf
|
||||
Nmap 5\&.59BETA3 ( http://nmap\&.org )
|
||||
Nmap 5\&.61TEST1 ( http://nmap\&.org )
|
||||
Usage: nmap [Scan Type(s)] [Options] {target specification}
|
||||
TARGET SPECIFICATION:
|
||||
Can pass hostnames, IP addresses, networks, etc\&.
|
||||
@@ -281,6 +278,14 @@ will perform an Internet\-wide scan for all IP addresses ending in 13\&.37\&. Th
|
||||
.\" IPv6
|
||||
.PP
|
||||
IPv6 addresses can only be specified by their fully qualified IPv6 address or hostname\&. CIDR and octet ranges aren\*(Aqt yet supported for IPv6\&.
|
||||
.\" link-local IPv6 address
|
||||
.\" IPv6 address: link-local
|
||||
.\" zone ID (IPv6 address)
|
||||
.PP
|
||||
IPv6 addresses with non\-global scope need to have a zone ID suffix\&. On Unix systems, this is a percent sign followed by an interface name; a complete address might be
|
||||
fe80::a8bb:ccff:fedd:eeff%eth0\&. On Windows, use an interface index number in place of an interface name:
|
||||
fe80::a8bb:ccff:fedd:eeff%1\&. You can see a list of interface indexes by running the command
|
||||
\fBnetsh\&.exe interface ipv6 show interface\fR\&.
|
||||
.PP
|
||||
Nmap accepts multiple host specifications on the command line, and they don\*(Aqt need to be the same type\&. The command
|
||||
\fBnmap scanme\&.nmap\&.org 192\&.168\&.0\&.0/8 10\&.0\&.0,1,3\-7\&.\-\fR
|
||||
@@ -1053,7 +1058,8 @@ Even if Nmap is right, and the hypothetical server above is running SMTP, HTTP,
|
||||
.PP
|
||||
After TCP and/or UDP ports are discovered using one of the other scan methods, version detection interrogates those ports to determine more about what is actually running\&. The
|
||||
nmap\-service\-probes.\" nmap-service-probes
|
||||
database contains probes for querying various services and match expressions to recognize and parse responses\&. Nmap tries to determine the service protocol (e\&.g\&. FTP, SSH, Telnet, HTTP), the application name (e\&.g\&. ISC BIND, Apache httpd, Solaris telnetd), the version number, hostname, device type (e\&.g\&. printer, router), the OS family (e\&.g\&. Windows, Linux) and sometimes miscellaneous details like whether an X server is open to connections, the SSH protocol version, or the KaZaA user name)\&. Of course, most services don\*(Aqt provide all of this information\&. If Nmap was compiled with OpenSSL support, it will connect to SSL servers to deduce the service listening behind that encryption layer\&..\" SSL: in version detection
|
||||
database contains probes for querying various services and match expressions to recognize and parse responses\&. Nmap tries to determine the service protocol (e\&.g\&. FTP, SSH, Telnet, HTTP), the application name (e\&.g\&. ISC BIND, Apache httpd, Solaris telnetd), the version number, hostname, device type (e\&.g\&. printer, router), the OS family (e\&.g\&. Windows, Linux)\&. When possible, Nmap also gets the Common Platform Enumeration (CPE).\" Common Platform Enumeration: service
|
||||
representation of this information\&. Sometimes miscellaneous details like whether an X server is open to connections, the SSH protocol version, or the KaZaA user name, are available\&. Of course, most services don\*(Aqt provide all of this information\&. If Nmap was compiled with OpenSSL support, it will connect to SSL servers to deduce the service listening behind that encryption layer\&..\" SSL: in version detection
|
||||
Some UDP ports are left in the
|
||||
open|filtered
|
||||
state after a UDP port scan is unable to determine whether the port is open or filtered\&. Version detection will try to elicit a response from these ports (just as it does with open ports), and change the state to open if it succeeds\&.
|
||||
@@ -1125,10 +1131,13 @@ This causes Nmap to print out extensive debugging info about what version scanni
|
||||
.\"
|
||||
.SH "OS DETECTION"
|
||||
.\" OS detection
|
||||
.\" CPE
|
||||
.PP
|
||||
One of Nmap\*(Aqs best\-known features is remote OS detection using TCP/IP stack fingerprinting\&. Nmap sends a series of TCP and UDP packets to the remote host and examines practically every bit in the responses\&. After performing dozens of tests such as TCP ISN sampling, TCP options support and ordering, IP ID sampling, and the initial window size check, Nmap compares the results to its
|
||||
nmap\-os\-db.\" nmap-os-db
|
||||
database of more than 2,600 known OS fingerprints and prints out the OS details if there is a match\&. Each fingerprint includes a freeform textual description of the OS, and a classification which provides the vendor name (e\&.g\&. Sun), underlying OS (e\&.g\&. Solaris), OS generation (e\&.g\&. 10), and device type (general purpose, router, switch, game console, etc)\&.
|
||||
database of more than 2,600 known OS fingerprints and prints out the OS details if there is a match\&. Each fingerprint includes a freeform textual description of the OS, and a classification which provides the vendor name (e\&.g\&. Sun), underlying OS (e\&.g\&. Solaris), OS generation (e\&.g\&. 10), and device type (general purpose, router, switch, game console, etc)\&. Most fingerprints also have a Common Platform Enumeration (CPE).\" Common Platform Enumeration: operating system
|
||||
representation, like
|
||||
cpe:/o:linux:kernel:2\&.6\&.
|
||||
.PP
|
||||
If Nmap is unable to guess the OS of a machine, and conditions are good (e\&.g\&. at least one open port and one closed port were found), Nmap will provide a URL you can use to submit the fingerprint if you know (for sure) the OS running on the machine\&. By doing this you contribute to the pool of operating systems known to Nmap and thus it will be more accurate for everyone\&.
|
||||
.PP
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
Nmap 5.59BETA3 ( http://nmap.org )
|
||||
Nmap 5.61TEST1 ( http://nmap.org )
|
||||
Usage: nmap [Scan Type(s)] [Options] {target specification}
|
||||
TARGET SPECIFICATION:
|
||||
Can pass hostnames, IP addresses, networks, etc.
|
||||
|
||||
@@ -2,12 +2,12 @@
|
||||
.\" Title: zenmap
|
||||
.\" Author: [see the "Authors" section]
|
||||
.\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
|
||||
.\" Date: 08/24/2011
|
||||
.\" Date: 09/19/2011
|
||||
.\" Manual: Zenmap Reference Guide
|
||||
.\" Source: Zenmap
|
||||
.\" Language: English
|
||||
.\"
|
||||
.TH "ZENMAP" "1" "08/24/2011" "Zenmap" "Zenmap Reference Guide"
|
||||
.TH "ZENMAP" "1" "09/19/2011" "Zenmap" "Zenmap Reference Guide"
|
||||
.\" -----------------------------------------------------------------
|
||||
.\" * Define some portability stuff
|
||||
.\" -----------------------------------------------------------------
|
||||
|
||||
@@ -2,12 +2,12 @@
|
||||
.\" Title: ndiff
|
||||
.\" Author: [see the "Authors" section]
|
||||
.\" Generator: DocBook XSL Stylesheets v1.76.1 <http://docbook.sf.net/>
|
||||
.\" Date: 08/24/2011
|
||||
.\" Date: 09/19/2011
|
||||
.\" Manual: User Commands
|
||||
.\" Source: Ndiff
|
||||
.\" Language: English
|
||||
.\"
|
||||
.TH "NDIFF" "1" "08/24/2011" "Ndiff" "User Commands"
|
||||
.TH "NDIFF" "1" "09/19/2011" "Ndiff" "User Commands"
|
||||
.\" -----------------------------------------------------------------
|
||||
.\" * Define some portability stuff
|
||||
.\" -----------------------------------------------------------------
|
||||
|
||||
Reference in New Issue
Block a user