1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-05 22:19:03 +00:00

Version number update to 4.77BETA, and some CHANGELOG updates (I'm not done) in prep for release

This commit is contained in:
fyodor
2009-01-23 02:12:34 +00:00
parent 95fcd4966d
commit 8560b99618
5 changed files with 155 additions and 139 deletions

View File

@@ -1,12 +1,12 @@
.\" Title: nmap
.\" Author: Gordon \(lqFyodor\(rq Lyon
.\" Generator: DocBook XSL Stylesheets v1.74.0 <http://docbook.sf.net/>
.\" Date: 12/08/2008
.\" Date: 01/22/2009
.\" Manual: Nmap Reference Guide
.\" Source: Nmap First Edition
.\" Language: English
.\"
.TH "NMAP" "1" "12/08/2008" "Nmap First Edition" "Nmap Reference Guide"
.TH "NMAP" "1" "01/22/2009" "Nmap First Edition" "Nmap Reference Guide"
.\" -----------------------------------------------------------------
.\" * (re)Define some macros
.\" -----------------------------------------------------------------
@@ -277,7 +277,7 @@ This options summary is printed when Nmap is run with no arguments, and the late
.ps -1
.nf
.BB lightgray
Nmap 4\&.76 ( http://nmap\&.org )
Nmap 4\&.77BETA ( http://nmap\&.org )
Usage: nmap [Scan Type(s)] [Options] {target specification}
TARGET SPECIFICATION:
Can pass hostnames, IP addresses, networks, etc\&.
@@ -290,12 +290,13 @@ HOST DISCOVERY:
\-sL: List Scan \- simply list targets to scan
\-sP: Ping Scan \- go no further than determining if host is online
\-PN: Treat all hosts as online \-\- skip host discovery
\-PS/PA/PU [portlist]: TCP SYN/ACK or UDP discovery to given ports
\-PS/PA/PU[portlist]: TCP SYN/ACK or UDP discovery to given ports
\-PE/PP/PM: ICMP echo, timestamp, and netmask request discovery probes
\-PO [protocol list]: IP Protocol Ping
\-PO[protocol list]: IP Protocol Ping
\-n/\-R: Never do DNS resolution/Always resolve [default: sometimes]
\-\-dns\-servers <serv1[,serv2],\&.\&.\&.>: Specify custom DNS servers
\-\-system\-dns: Use OS\'s DNS resolver
\-\-traceroute: Trace hop path to each host
SCAN TECHNIQUES:
\-sS/sT/sA/sW/sM: TCP SYN/Connect()/ACK/Window/Maimon scans
\-sU: UDP Scan
@@ -304,8 +305,6 @@ SCAN TECHNIQUES:
\-sI <zombie host[:probeport]>: Idle scan
\-sO: IP protocol scan
\-b <FTP relay host>: FTP bounce scan
\-\-traceroute: Trace hop path to each host
\-\-reason: Display the reason a port is in a particular state
PORT SPECIFICATION AND SCAN ORDER:
\-p <port ranges>: Only scan specified ports
Ex: \-p22; \-p1\-65535; \-p U:53,111,137,T:21\-25,80,139,8080
@@ -333,7 +332,7 @@ OS DETECTION:
TIMING AND PERFORMANCE:
Options which take <time> are in milliseconds, unless you append \'s\'
(seconds), \'m\' (minutes), or \'h\' (hours) to the value (e\&.g\&. 30m)\&.
\-T[0\-5]: Set timing template (higher is faster)
\-T<0\-5>: Set timing template (higher is faster)
\-\-min\-hostgroup/max\-hostgroup <size>: Parallel host scan group sizes
\-\-min\-parallelism/max\-parallelism <time>: Probe parallelization
\-\-min\-rtt\-timeout/max\-rtt\-timeout/initial\-rtt\-timeout <time>: Specifies
@@ -360,6 +359,7 @@ OUTPUT:
\-oA <basename>: Output in the three major formats at once
\-v: Increase verbosity level (use twice or more for greater effect)
\-d[level]: Set or increase debugging level (Up to 9 is meaningful)
\-\-reason: Display the reason a port is in a particular state
\-\-open: Only show open (or possibly open) ports
\-\-packet\-trace: Show all packets sent and received
\-\-iflist: Print host interfaces and routes (for debugging)
@@ -989,9 +989,7 @@ This vulnerability was widespread in 1997 when Nmap was released, but has largel
.SH "Port Specification and Scan Order"
.\" port specification
.PP
In addition to all of the scan methods discussed previously, Nmap offers options for specifying which ports are scanned and whether the scan order is randomized or sequential\&. By default, Nmap scans all ports up to and including 1024 as well as higher numbered ports listed in the
\FCnmap\-services\F[]
file for the protocol(s) being scanned\&.
In addition to all of the scan methods discussed previously, Nmap offers options for specifying which ports are scanned and whether the scan order is randomized or sequential\&. By default, Nmap scans the most common 1,000 ports for each protocol\&.
.\" default ports
.PP
\fB\-p \fR\fB\fIport ranges\fR\fR (Only scan specified ports) .\" -p
@@ -1000,14 +998,14 @@ This option specifies which ports you want to scan and overrides the default\&.
\FC1\-1023\F[])\&. The beginning and/or end values of a range may be omitted, causing Nmap to use 1 and 65535, respectively\&. So you can specify
\fB\-p\-\fR
to scan ports from 1 through 65535\&. Scanning port zero.\" port zero
is allowed if you specify it explicitly\&. For IP protocol scanning (\fB\-sO\fR), this option specifies the protocol numbers you wish to scan for (0\-255)\&.
is allowed if you specify it explicitly\&. For IP protocol scanning (\fB\-sO\fR), this option specifies the protocol numbers you wish to scan for (0\(en255)\&.
.sp
When scanning both TCP and UDP ports, you can specify a particular protocol by preceding the port numbers by
\FCT:\F[]
or
\FCU:\F[]\&. The qualifier lasts until you specify another qualifier\&. For example, the argument
\fB\-p U:53,111,137,T:21\-25,80,139,8080\fR
would scan UDP ports 53,111,and 137, as well as the listed TCP ports\&. Note that to scan both UDP and TCP, you have to specify
would scan UDP ports 53, 111,and 137, as well as the listed TCP ports\&. Note that to scan both UDP and TCP, you have to specify
\fB\-sU\fR
and at least one TCP scan type (such as
\fB\-sS\fR,
@@ -1057,9 +1055,7 @@ for sequential port scanning instead\&.
.\" --port-ratio
Scans all ports in
\FCnmap\-services\F[]
file with a ratio greater than the number specified as the argument\&. (new format
\FCnmap\-services\F[]
only\&.)
file with a ratio greater than the number specified as the argument\&.
.RE
.PP
\fB\-\-top\-ports <integer of 1 or greater>\fR
@@ -1067,9 +1063,7 @@ only\&.)
.\" --top-ports
Scans the N highest\-ratio ports found in
\FCnmap\-services\F[]
file\&. (new format
\FCnmap\-services\F[]
only\&.)
file\&.
.RE
.SH "Service and Version Detection"
.\" version detection
@@ -1255,7 +1249,7 @@ Runs a script scan (like
\FC$NMAPDIR/\F[];.\" NMAPDIR environment variable
\FC~/\&.nmap/\F[]
(not searched on Windows);.\" .nmap directory
NMAPDATADIR/ or.\" NMAPDATADIR
\FCNMAPDATADIR\F[]/ or.\" NMAPDATADIR
\FC\&./\F[]\&. A
\FCscripts/\F[]
subdirectory is also tried in each of these\&.