1
0
mirror of https://github.com/nmap/nmap.git synced 2026-02-16 02:16:34 +00:00

Update --spoof-mac section; remove Nmap version numbers and time from Nmap startup-messages. Canonicalize the Nmap capitalization and URL from those messages too.

This commit is contained in:
fyodor
2008-06-09 08:38:29 +00:00
parent 46ce09a994
commit a3a6853c08
2 changed files with 6 additions and 6 deletions

View File

@@ -82,7 +82,7 @@
<screen>
# nmap -A -T4 scanme.nmap.org playground
Starting nmap ( http://nmap.org )
Starting Nmap ( http://nmap.org )
Interesting ports on scanme.nmap.org (205.217.153.62):
(The 1663 ports scanned but not shown below are in state: filtered)
PORT STATE SERVICE VERSION
@@ -2823,17 +2823,17 @@ support the option completely, as does UDP scan.</para>
raw ethernet frames it sends. This option implies
<option>--send-eth</option> to ensure that Nmap actually sends
ethernet-level packets. The MAC given can take several formats. If
it is simply the string <quote>0</quote>, Nmap chooses a completely random MAC
it is simply the number <literal>0</literal>, Nmap chooses a completely random MAC address
for the session. If the given string is an even number of hex
digits (with the pairs optionally separated by a colon), Nmap will
use those as the MAC. If less than 12 hex digits are provided, Nmap
use those as the MAC. If fewer than 12 hex digits are provided, Nmap
fills in the remainder of the 6 bytes with random values. If the
argument isn't a 0 or hex string, Nmap looks through
<filename>nmap-mac-prefixes</filename> to find a vendor name containing the given string
(it is case insensitive). If a match is found, Nmap uses the
vendor's OUI (3-byte prefix) and fills out the remaining 3 bytes
randomly. Valid <option>--spoof-mac</option> argument examples are <literal>Apple</literal>, <literal>0</literal>,
<literal>01:02:03:04:05:06</literal>, <literal>deadbeefcafe</literal>, <literal>0020F2</literal>, and <literal>Cisco</literal>.</para>
<literal>01:02:03:04:05:06</literal>, <literal>deadbeefcafe</literal>, <literal>0020F2</literal>, and <literal>Cisco</literal>. This option only affects raw packet scans such as SYN scan or OS detection, not connection-oriented features such as version detection or the Nmap Scripting Engine.</para>
</listitem>
</varlistentry>