diff --git a/docs/refguide.xml b/docs/refguide.xml index 1573052fa..3f5d563f0 100644 --- a/docs/refguide.xml +++ b/docs/refguide.xml @@ -82,7 +82,7 @@ # nmap -A -T4 scanme.nmap.org playground -Starting nmap ( http://nmap.org ) +Starting Nmap ( http://nmap.org ) Interesting ports on scanme.nmap.org (205.217.153.62): (The 1663 ports scanned but not shown below are in state: filtered) PORT STATE SERVICE VERSION @@ -2823,17 +2823,17 @@ support the option completely, as does UDP scan. raw ethernet frames it sends. This option implies to ensure that Nmap actually sends ethernet-level packets. The MAC given can take several formats. If - it is simply the string 0, Nmap chooses a completely random MAC + it is simply the number 0, Nmap chooses a completely random MAC address for the session. If the given string is an even number of hex digits (with the pairs optionally separated by a colon), Nmap will - use those as the MAC. If less than 12 hex digits are provided, Nmap + use those as the MAC. If fewer than 12 hex digits are provided, Nmap fills in the remainder of the 6 bytes with random values. If the argument isn't a 0 or hex string, Nmap looks through nmap-mac-prefixes to find a vendor name containing the given string (it is case insensitive). If a match is found, Nmap uses the vendor's OUI (3-byte prefix) and fills out the remaining 3 bytes randomly. Valid argument examples are Apple, 0, - 01:02:03:04:05:06, deadbeefcafe, 0020F2, and Cisco. + 01:02:03:04:05:06, deadbeefcafe, 0020F2, and Cisco. This option only affects raw packet scans such as SYN scan or OS detection, not connection-oriented features such as version detection or the Nmap Scripting Engine. diff --git a/docs/scripting.xml b/docs/scripting.xml index 7ca6014be..d15b1a6f6 100644 --- a/docs/scripting.xml +++ b/docs/scripting.xml @@ -150,7 +150,7 @@ The reference manual is also $ ./nmap -sC localhost -p 22,23,80,113 -Starting Nmap 4.20ALPHA9-NSE ( http://insecure.org ) +Starting Nmap ( http://nmap.org ) Interesting ports on localhost (127.0.0.1): PORT STATE SERVICE 22/tcp open ssh @@ -3099,7 +3099,7 @@ end $ ./nmap -sV localhost -p 80 -Starting Nmap ( http://insecure.org ) +Starting Nmap ( http://nmap.org ) Interesting ports on localhost (127.0.0.1): PORT STATE SERVICE VERSION 80/tcp open [Name] [Product] [Version] ([ExtraInfo])