mirror of
https://github.com/nmap/nmap.git
synced 2026-01-06 06:29:03 +00:00
merge soc07 r5100:5105 - Added traceroute to -A & updated docs
This commit is contained in:
@@ -180,7 +180,7 @@ OUTPUT:
|
||||
\-\-no\-stylesheet: Prevent associating of XSL stylesheet w/XML output
|
||||
MISC:
|
||||
\-6: Enable IPv6 scanning
|
||||
\-A: Enables OS detection and Version detection
|
||||
\-A: Enables OS detection, Version detection, Script scanning and Traceroute
|
||||
\-\-datadir <dirname>: Specify custom Nmap data file location
|
||||
\-\-send\-eth/\-\-send\-ip: Send using raw ethernet frames or IP packets
|
||||
\-\-privileged: Assume that the user is fully privileged
|
||||
@@ -1325,7 +1325,7 @@ While IPv6 hasn't exactly taken the world by storm, it gets significant use in s
|
||||
\fI\%http://ipv6tb.he.net/\fR. 6to4 tunnels are another popular, free approach.
|
||||
.TP
|
||||
\fB\-A\fR (Aggressive scan options)
|
||||
This option enables additional advanced and aggressive options. I haven't decided exactly which it stands for yet. Presently this enables OS Detection (\fB\-O\fR) and version scanning (\fB\-sV\fR). More features may be added in the future. The point is to enable a comprehensive set of scan options without people having to remember a large set of flags. This option only enables features, and not timing options (such as
|
||||
This option enables additional advanced and aggressive options. I haven't decided exactly which it stands for yet. Presently this enables OS Detection (\fB\-O\fR), version scanning (\fB\-sV\fR), script scanning (\fB\-sC\fR) and traceroute (\fB\-\-traceroute\fR). More features may be added in the future. The point is to enable a comprehensive set of scan options without people having to remember a large set of flags. This option only enables features, and not timing options (such as
|
||||
\fB\-T4\fR) or verbosity options (\fB\-v\fR) that you might want as well.
|
||||
.TP
|
||||
\fB\-\-datadir <directoryname>\fR (Specify custom Nmap data file location)
|
||||
|
||||
@@ -89,7 +89,7 @@ OUTPUT:
|
||||
--no-stylesheet: Prevent associating of XSL stylesheet w/XML output
|
||||
MISC:
|
||||
-6: Enable IPv6 scanning
|
||||
-A: Enables OS detection and Version detection
|
||||
-A: Enables OS detection, Version detection, Script scanning and Traceroute
|
||||
--datadir <dirname>: Specify custom Nmap data file location
|
||||
--send-eth/--send-ip: Send using raw ethernet frames or IP packets
|
||||
--privileged: Assume that the user is fully privileged
|
||||
|
||||
@@ -75,8 +75,8 @@
|
||||
<para>A typical Nmap scan is shown in <xref
|
||||
linkend="man-ex-repscan" />. The only Nmap arguments used in
|
||||
this example are <option>-A</option>, to enable OS and version
|
||||
detection, <option>-T4</option> for faster execution, and then the
|
||||
two target hostnames.</para>
|
||||
detection, script scanning, and traceroute; <option>-T4</option> for
|
||||
faster execution; and then the two target hostnames.</para>
|
||||
|
||||
<example id="man-ex-repscan"><title>A representative Nmap scan</title>
|
||||
<screen>
|
||||
@@ -1523,8 +1523,8 @@ way.</para>
|
||||
|
||||
<indexterm><primary>-sV</primary></indexterm>
|
||||
<para>Enables version detection, as discussed above.
|
||||
Alternatively, you can use <option>-A</option> to enable
|
||||
both OS detection and version detection.</para>
|
||||
Alternatively, you can use <option>-A</option>, which enables
|
||||
version detection among other things.</para>
|
||||
|
||||
</listitem>
|
||||
</varlistentry>
|
||||
@@ -1700,7 +1700,7 @@ way.</para>
|
||||
|
||||
<para>Enables OS detection, as discussed above.
|
||||
Alternatively, you can use <option>-A</option> to enable
|
||||
both OS detection and version detection. 2nd generation OS
|
||||
OS detection along with other things. 2nd generation OS
|
||||
detection is tried first. If that fails, Nmap will either
|
||||
print out the host fingerprint and ask you to submit it (if
|
||||
you are certain about what the target host is running), or
|
||||
@@ -3056,7 +3056,9 @@ overwhelming requests. Specify <option>--open</option> to only see
|
||||
<para>This option enables additional advanced and
|
||||
aggressive options. I haven't decided exactly which it
|
||||
stands for yet. Presently this enables OS Detection
|
||||
(<option>-O</option>) and version scanning (<option>-sV</option>). More features may be
|
||||
(<option>-O</option>), version scanning (<option>-sV</option>),
|
||||
script scanning (<option>-sC</option>) and
|
||||
traceroute (<option>--traceroute</option>). More features may be
|
||||
added in the future. The point is to enable a
|
||||
comprehensive set of scan options without people having
|
||||
to remember a large set of flags. This option only
|
||||
|
||||
6
nmap.cc
6
nmap.cc
@@ -305,7 +305,7 @@ printf("%s %s ( %s )\n"
|
||||
" --no-stylesheet: Prevent associating of XSL stylesheet w/XML output\n"
|
||||
"MISC:\n"
|
||||
" -6: Enable IPv6 scanning\n"
|
||||
" -A: Enables OS detection and Version detection\n"
|
||||
" -A: Enables OS detection and Version detection, Script scanning and Traceroute\n"
|
||||
" --datadir <dirname>: Specify custom Nmap data file location\n"
|
||||
" --send-eth/--send-ip: Send using raw ethernet frames or IP packets\n"
|
||||
" --privileged: Assume that the user is fully privileged\n"
|
||||
@@ -893,8 +893,10 @@ int nmap_main(int argc, char *argv[]) {
|
||||
#ifndef NOLUA
|
||||
o.script = 1;
|
||||
#endif
|
||||
if (o.isr00t)
|
||||
if (o.isr00t) {
|
||||
o.osscan = OS_SCAN_DEFAULT;
|
||||
o.traceroute = true;
|
||||
}
|
||||
break;
|
||||
case 'b':
|
||||
o.bouncescan++;
|
||||
|
||||
Reference in New Issue
Block a user