mirror of
https://github.com/nmap/nmap.git
synced 2026-01-18 20:29:02 +00:00
Merge Nmap 7.93 release branch
This commit is contained in:
@@ -2,12 +2,12 @@
|
||||
.\" Title: nping
|
||||
.\" Author: [see the "Authors" section]
|
||||
.\" Generator: DocBook XSL Stylesheets v1.79.1 <http://docbook.sf.net/>
|
||||
.\" Date: 04/15/2022
|
||||
.\" Date: 08/31/2022
|
||||
.\" Manual: Nping Reference Guide
|
||||
.\" Source: Nping
|
||||
.\" Language: English
|
||||
.\"
|
||||
.TH "NPING" "1" "04/15/2022" "Nping" "Nping Reference Guide"
|
||||
.TH "NPING" "1" "08/31/2022" "Nping" "Nping Reference Guide"
|
||||
.\" -----------------------------------------------------------------
|
||||
.\" * Define some portability stuff
|
||||
.\" -----------------------------------------------------------------
|
||||
@@ -92,12 +92,12 @@ This options summary is printed when Nping is run with no arguments\&. It helps
|
||||
.RS 4
|
||||
.\}
|
||||
.nf
|
||||
Nping 0\&.5\&.59BETA1 ( https://nmap\&.org/nping )
|
||||
Nping 0\&.7\&.92SVN ( https://nmap\&.org/nping )
|
||||
Usage: nping [Probe mode] [Options] {target specification}
|
||||
|
||||
TARGET SPECIFICATION:
|
||||
Targets may be specified as hostnames, IP addresses, networks, etc\&.
|
||||
Ex: scanme\&.nmap\&.org, microsoft\&.com/24, 192\&.168\&.0\&.1; 10\&.0\&.0\-255\&.1\-254
|
||||
Ex: scanme\&.nmap\&.org, microsoft\&.com/24, 192\&.168\&.0\&.1; 10\&.0\&.*\&.1\-24
|
||||
PROBE MODES:
|
||||
\-\-tcp\-connect : Unprivileged TCP connect probe mode\&.
|
||||
\-\-tcp : TCP probe mode\&.
|
||||
@@ -147,6 +147,7 @@ IPv4 OPTIONS:
|
||||
\-\-id <id> : Set identification field (16 bits)\&.
|
||||
\-\-df : Set Don\*(Aqt Fragment flag\&.
|
||||
\-\-mf : Set More Fragments flag\&.
|
||||
\-\-evil : Set Reserved / Evil flag\&.
|
||||
\-\-ttl <hops> : Set time to live [0\-255]\&.
|
||||
\-\-badsum\-ip : Use a random invalid checksum\&.
|
||||
\-\-ip\-options <S|R [route]|L [route]|T|U \&.\&.\&.> : Set IP options
|
||||
@@ -190,7 +191,7 @@ MISC:
|
||||
\-N, \-\-no\-capture : Do not try to capture replies\&.
|
||||
\-\-privileged : Assume user is fully privileged\&.
|
||||
\-\-unprivileged : Assume user lacks raw socket privileges\&.
|
||||
\-\-send\-eth : Send packets at the raw ethernet layer\&.
|
||||
\-\-send\-eth : Send packets at the raw Ethernet layer\&.
|
||||
\-\-send\-ip : Send packets using raw IP sockets\&.
|
||||
\-\-bpf\-filter <filter spec> : Specify custom BPF filter\&.
|
||||
OUTPUT:
|
||||
@@ -1100,6 +1101,11 @@ Sets the Don\*(Aqt Fragment bit in sent packets\&. When an IP datagram has its D
|
||||
Sets the More Fragments bit in sent packets\&. The MF flag is set to indicate the receiver that the current datagram is a fragment of some larger datagram\&. When set to zero it indicates that the current datagram is either the last fragment in the set or that it is the only fragment\&.
|
||||
.RE
|
||||
.PP
|
||||
\fB\-\-evil\fR (Reserved / Evil)
|
||||
.RS 4
|
||||
Sets the Reserved / Evil bit in sent packets\&. The Evil flag helps firewalls and other network security systems to distinguish between datagrams that have malicious intent and those that are merely unusual\&. When set, it indicates that the datagram has evil intent, instructing insecure systems to succumb\&. Setting it to zero indicates no evil intent\&. The option is implied if environmental variable SCRIPT_KIDDIE is set to a non\-zero value\&.
|
||||
.RE
|
||||
.PP
|
||||
\fB\-\-ttl \fR\fB\fIhops\fR\fR (Time To Live)
|
||||
.RS 4
|
||||
Sets the IPv4 Time\-To\-Live (TTL) field in sent packets to the given value\&. The TTL field specifies how long the datagram is allowed to exist on the network\&. It was originally intended to represent a number of seconds but it actually represents the number of hops a packet can traverse before being dropped\&. The TTL tries to avoid a situation in which undeliverable datagrams keep being forwarded from one router to another endlessly\&.
|
||||
|
||||
Reference in New Issue
Block a user