1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-01 12:29:03 +00:00

Zenmap: keep data files within package

This commit is contained in:
dmiller
2024-03-27 16:35:29 +00:00
parent 60a762c745
commit b41175cd6c
93 changed files with 33 additions and 44 deletions

View File

@@ -76,5 +76,4 @@ base_paths = dict(user_config_file=APP_NAME + '.conf',
target_list='target_list.txt',
options='options.xml',
user_home=HOME,
db=APP_NAME + ".db",
version=APP_NAME + "_version")
db=APP_NAME + ".db")

View File

@@ -68,38 +68,13 @@ from zenmapCore.BasePaths import base_paths
from zenmapCore.Name import APP_NAME
# Find out the prefix under which data files (interface definition XML,
# pixmaps, etc.) are stored. This can vary depending on whether we are running
# in an executable package and what type of package it is, which we check using
# the sys.frozen attribute. See
# http://mail.python.org/pipermail/pythonmac-sig/2004-November/012121.html.
def get_prefix():
from site import getsitepackages
frozen = getattr(sys, "frozen", None)
if frozen == "macosx_app" or "Zenmap.app" in sys.executable:
# A py2app .app bundle.
return os.path.join(dirname(sys.executable), "..", "Resources")
elif frozen is not None:
# Assume a py2exe executable.
return dirname(sys.executable)
elif any(__file__.startswith(pdir) for pdir in getsitepackages()):
# Installed in site-packages; use configured prefix.
return sys.prefix
else:
# Normal script execution. Look in the current directory to allow
# running from the distribution.
return os.path.abspath(os.path.dirname(sys.argv[0]))
prefix = join(dirname(__file__), 'data')
prefix = get_prefix()
# These lines are overwritten by the installer to hard-code the installed
# locations.
CONFIG_DIR = join(prefix, "share", APP_NAME, "config")
LOCALE_DIR = join(prefix, "share", APP_NAME, "locale")
MISC_DIR = join(prefix, "share", APP_NAME, "misc")
PIXMAPS_DIR = join(prefix, "share", "zenmap", "pixmaps")
DOCS_DIR = join(prefix, "share", APP_NAME, "docs")
NMAPDATADIR = join(prefix, "..")
CONFIG_DIR = join(prefix, "config")
LOCALE_DIR = join(prefix, "locale")
MISC_DIR = join(prefix, "misc")
PIXMAPS_DIR = join(prefix, "pixmaps")
DOCS_DIR = join(prefix, "docs")
def get_extra_executable_search_paths():
@@ -125,7 +100,7 @@ class Paths(object):
config_files_list = ["config_file",
"scan_profile",
"version"]
]
empty_config_files_list = ["target_list",
"recent_scans",
@@ -140,8 +115,16 @@ class Paths(object):
self.pixmaps_dir = PIXMAPS_DIR
self.misc_dir = MISC_DIR
self.docs_dir = DOCS_DIR
self.nmap_dir = NMAPDATADIR
self._delayed_incomplete = True
PATH = os.environ.get('PATH', os.defpath)
extra = get_extra_executable_search_paths()
if extra:
PATH += ';' + ';'.join(extra)
NMAPPATH = dirname(shutil.which("nmap", path=PATH))
if sys.platform == 'win32':
self.nmap_dir = NMAPPATH
else:
self.nmap_dir = join(NMAPPATH, "..", "share", "nmap")
# Delay initializing these paths so that
# zenmapCore.I18N.install_gettext can install _() before modules that
@@ -241,4 +224,3 @@ if __name__ == '__main__':
print(">>> OPTIONS:", Path.options)
print()
print(">>> DB:", Path.db)
print(">>> VERSION:", Path.version)

View File

@@ -0,0 +1,40 @@
[Intense scan]
command = nmap -T4 -A -v
description = An intense, comprehensive scan. The -A option enables OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute). Without root privileges only version detection and script scanning are run. This is considered an intrusive scan.
[Intense scan plus UDP]
command = nmap -sS -sU -T4 -A -v
description = Does OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute) in addition to scanning TCP and UDP ports.
[Intense scan, all TCP ports]
command = nmap -p 1-65535 -T4 -A -v
description = Scans all TCP ports, then does OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute).
[Intense scan, no ping]
command = nmap -T4 -A -v -Pn
description = Does an intense scan without checking to see if targets are up first. This can be useful when a target seems to ignore the usual host discovery probes.
[Ping scan]
command = nmap -sn
description = This scan only finds which targets are up and does not port scan them.
[Quick scan]
command = nmap -T4 -F
description = This scan is faster than a normal scan because it uses the aggressive timing template and scans fewer ports.
[Quick scan plus]
command = nmap -sV -T4 -O -F --version-light
description = A quick scan plus OS and version detection.
[Quick traceroute]
command = nmap -sn --traceroute
description = Traces the paths to targets without doing a full port scan on them.
[Regular scan]
command = nmap
description = A basic port scan with no extra options.
[Slow comprehensive scan]
command = nmap -sS -sU -T4 -A -v -PE -PS80,443 -PA3389 -PP -PU40125 -PY --source-port 53 --script "default or (discovery and safe)"
description = This is a comprehensive, slow scan. Every TCP and UDP port is scanned. OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute) are all enabled. Many probes are sent for host discovery. This is a highly intrusive scan.

View File

@@ -0,0 +1,83 @@
[closed_port_highlight]
regex = \d{1,5}/.{1,5}\s+closed\s+.*
bold = 0
text = [65535, 0, 0]
italic = 0
highlight = [65535, 65535, 65535]
underline = 0
[date_highlight]
regex = \d{4}-\d{2}-\d{2}\s\d{2}:\d{2}\s.{1,4}
bold = 1
text = [0, 0, 0]
italic = 0
highlight = [65535, 65535, 65535]
underline = 0
[details_highlight]
regex = ^[A-Za-z]+(\s[A-Za-z]*){0,8}:
bold = 1
text = [0, 0, 0]
italic = 0
highlight = [65535, 65535, 65535]
underline = 1
[filtered_port_highlight]
regex = \d{1,5}/.{1,5}\s+filtered\s+.*
bold = 0
text = [38502, 39119, 0]
italic = 0
highlight = [65535, 65535, 65535]
underline = 0
[hostname_highlight]
regex = ([-a-zA-Z]{2,}://)?\b([-a-zA-Z0-9_]+\.)+[a-zA-Z]{2,}\b
bold = 0
text = [0, 111, 65535]
italic = 0
highlight = [65535, 65535, 65535]
underline = 0
[ip_highlight]
regex = \d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}
bold = 1
text = [0, 0, 0]
italic = 0
highlight = [65535, 65535, 65535]
underline = 0
[open_port_highlight]
regex = \d{1,5}/.{1,5}\s+open\s+.*
bold = 1
text = [0, 41036, 2396]
italic = 0
highlight = [65535, 65535, 65535]
underline = 0
[output_highlight]
enable_highlight = True
[paths]
nmap_command_path = nmap
ndiff_command_path = ndiff
[port_list_highlight]
regex = ^PORT\s+STATE\s+SERVICE(\s+VERSION)?.*
bold = 1
text = [0, 1272, 28362]
italic = 0
highlight = [65535, 65535, 65535]
underline = 0
[search]
search_db = 1
file_extension = xml
store_results = 1
directory =
save_time = 60;days
[window]
x = 0
y = 0
width = -1
height = 650

View File

@@ -0,0 +1 @@
7.94+SVN

View File

@@ -0,0 +1,16 @@
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1">
<title>Nmap/Zenmap Help</title>
</head>
<body bgcolor="white" text="black">
<h1>Nmap/Zenmap Help</h1>
<p>Nmap is documented extensively online. Zenmap documentation exists and is improving. You can find it all at the <a href="https://nmap.org/docs.html">Nmap documentation directory</a>. Further information is available from the <a href="https://nmap.org/zenmap/">Zenmap web page</a> itself.
<p>On Unix, you can also run <b>man nmap</b> and <b>man zenmap</b> to learn about your installed Nmap version, though the <a href="https://nmap.org/docs.html">online Nmap docs</a> are more comprehensive and always up-to-date.
<p>For quick reference to the most popular Nmap command-line arguments, run <b>nmap -h</b>.
</body>
</html>

View File

@@ -0,0 +1,39 @@
LINGUAS = $(patsubst %.po,%,$(wildcard *.po))
TOPDIR = ../../..
SOURCEFILES = zenmap
SOURCEDIRS = zenmapCore zenmapGUI radialnet
PROFILE_EDITOR_XML = share/zenmap/misc/profile_editor.xml
XGETTEXT = xgettext
MSGID_BUGS_ADDRESS = dev@nmap.org
ZENMAP_POT = zenmap.pot
TMP_POT = tmp.pot
TMP_PO = tmp.po
all:
@echo 'Run "make update-pot" to update $(ZENMAP_POT).'
@echo 'Run "make <XX>.po" to update <XX>.po from $(ZENMAP_POT).'
@echo 'Run "make update-mo" to update all MO files from PO files.'
update-pot:
(echo $(SOURCEFILES); cd $(TOPDIR) && find $(SOURCEDIRS) -name '*.py') \
| $(XGETTEXT) -D $(TOPDIR) --from-code=utf-8 --language=python --msgid-bugs-address=$(MSGID_BUGS_ADDRESS) -f - -o $(TMP_POT)
./xgettext-profile_editor.py -D $(TOPDIR) $(PROFILE_EDITOR_XML) >> $(TMP_POT)
msguniq --to-code=utf-8 $(TMP_POT) | msgmerge -U --backup=none $(ZENMAP_POT) -
rm -f $(TMP_POT)
update-mo: $(addsuffix /LC_MESSAGES/zenmap.mo,$(LINGUAS))
%.po: $(ZENMAP_POT)
cp -f $@ $(TMP_PO)
msgmerge -N $(TMP_PO) $< | msgattrib --no-obsolete -o $@
rm -f $(TMP_PO)
%/LC_MESSAGES/zenmap.mo: %.po
mkdir -p $*/LC_MESSAGES
msgfmt $< -o $@
.PHONY: update-pot

File diff suppressed because it is too large Load Diff

Binary file not shown.

File diff suppressed because it is too large Load Diff

Binary file not shown.

File diff suppressed because it is too large Load Diff

Binary file not shown.

File diff suppressed because it is too large Load Diff

Binary file not shown.

File diff suppressed because it is too large Load Diff

Binary file not shown.

File diff suppressed because it is too large Load Diff

Binary file not shown.

File diff suppressed because it is too large Load Diff

Binary file not shown.

File diff suppressed because it is too large Load Diff

Binary file not shown.

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

Binary file not shown.

View File

@@ -0,0 +1,59 @@
#!/usr/bin/env python3
# This program acts like xgettext, specialized to extract strings from Zenmap's
# profile_editor.xml file.
import getopt
import os
import sys
# Prevent loading PyXML
import xml
xml.__path__ = [x for x in xml.__path__ if "_xmlplus" not in x]
import xml.sax
directory = None
def escape(s):
return '"' + s.replace('"', '\\"') + '"'
def output_msgid(msgid, locator):
print()
print("#: %s:%d" % (locator.getSystemId(), locator.getLineNumber()))
print("msgid", escape(msgid))
print("msgstr", escape(""))
class Handler (xml.sax.handler.ContentHandler):
def setDocumentLocator(self, locator):
self.locator = locator
def startElement(self, name, attrs):
if name == "group":
output_msgid(attrs["name"], self.locator)
if attrs.get("short_desc"):
output_msgid(attrs["short_desc"], self.locator)
if attrs.get("label"):
output_msgid(attrs["label"], self.locator)
opts, filenames = getopt.gnu_getopt(sys.argv[1:], "D:", ["directory="])
for o, a in opts:
if o == "-D" or o == "--directory":
directory = a
if directory is not None:
os.chdir(directory)
for fn in filenames:
with open(fn, "r") as f:
parser = xml.sax.make_parser()
parser.setContentHandler(Handler())
parser.parse(f)
if len(filenames) < 2:
parser = xml.sax.make_parser()
parser.setContentHandler(Handler())
parser.parse

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

Binary file not shown.

View File

@@ -0,0 +1,110 @@
<?xml version="1.0"?>
<!-- XML file to populate the Profile Editor interface -->
<!-- When adding a new option_check, be sure to update the function
get_option_check_auxiliary_widget in zenmapGUI/OptionBuilder.py. That
function only needs to know about the options in this file. -->
<interface>
<groups>
<group name="Scan"/>
<group name="Ping"/>
<group name="Scripting"/>
<group name="Target"/>
<group name="Source"/>
<group name="Other"/>
<group name="Timing"/>
</groups>
<Scan label="Scan options">
<target label="Targets (optional): "/>
<option_list label="TCP scan: ">
<option label="None"/>
<option option="-sA" label="ACK scan" short_desc="Send probes with the ACK flag set. Ports will be marked &quot;filtered&quot; or &quot;unfiltered&quot;. Use ACK scan to map out firewall rulesets."/>
<option option="-sF" label="FIN scan" short_desc="Send probes with the FIN bit set. FIN scan can differentiate &quot;closed&quot; and &quot;open|filtered&quot; ports on some systems."/>
<option option="-sM" label="Maimon scan" short_desc="Send probes with the FIN and ACK bits set. Against some BSD-derived systems this can differentiate between &quot;closed&quot; and &quot;open|filtered&quot; ports."/>
<option option="-sN" label="Null scan" short_desc="Send probes with no flags set (TCP flag header is 0). Null scan can differentiate &quot;closed&quot; and &quot;open|filtered&quot; ports on some systems."/>
<option option="-sS" label="TCP SYN scan" short_desc="Send probes with the SYN flag set. This is the most popular scan and the most generally useful. It is known as a &quot;stealth&quot; scan because it avoids making a full TCP connection."/>
<option option="-sT" label="TCP connect scan" short_desc="Scan using the connect system call. This is like SYN scan but less stealthy because it makes a full TCP connection. It is the default when a user does not have raw packet privileges or is scanning IPv6 networks."/>
<option option="-sW" label="Window scan" short_desc="Same as ACK scan except that it exploits an implementation detail of certain systems to differentiate open ports from closed ones, rather than always printing &quot;unfiltered&quot; when a RST is returned. "/>
<option option="-sX" label="Xmas Tree scan" short_desc="Send probes with the FIN, PSH, and URG flags set, lighting the packets up like a Christmas tree. Xmas tree scan can differentiate &quot;closed&quot; and &quot;open|filtered&quot; ports on some systems."/>
</option_list>
<option_list label="Non-TCP scans: ">
<option label="None"/>
<option option="-sU" label="UDP scan" short_desc="Scan UDP ports. UDP is in general slower and more difficult to scan than TCP, and is often ignored by security auditors."/>
<option option="-sO" label="IP protocol scan" short_desc="Scan IP protocols (TCP, ICMP, IGMP, etc.) to find which are supported by target machines."/>
<option option="-sL" label="List scan" short_desc="Do not scan any targets, just list which ones would be scanned (with reverse DNS names if available)."/>
<option option="-sn" label="No port scan" short_desc="Skip the port scanning phase. Other phases (host discovery, script scan, traceroute) may still run."/>
<option option="-sY" label="SCTP INIT port scan" short_desc="SCTP is a layer 4 protocol used mostly for telephony related applications. This is the SCTP equivalent of a TCP SYN stealth scan."/>
<option option="-sZ" label="SCTP cookie-echo port scan"
short_desc="SCTP is a layer 4 protocol used mostly for telephony related applications."/>
</option_list>
<option_list label="Timing template: ">
<option label="None"/>
<option option="-T" argument="0" label="Paranoid" short_desc="Set the timing template for IDS evasion."/>
<option option="-T" argument="1" label="Sneaky" short_desc="Set the timing template for IDS evasion."/>
<option option="-T" argument="2" label="Polite" short_desc="Set the timing template to slow down the scan to use less bandwidth and target machine resources."/>
<option option="-T" argument="3" label="Normal" short_desc="Set the timing template to not modify the default Nmap value."/>
<option option="-T" argument="4" label="Aggressive" short_desc="Set the timing template for faster scan. Used when on a reasonably fast and reliable network."/>
<option option="-T" argument="5" label="Insane" short_desc="Set the timing template for the fastest scan. Used when on a fast network or when willing to sacrifice accuracy for speed."/>
</option_list>
<option_check option="-A" label="Enable all advanced/aggressive options" short_desc="Enable OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute)."/>
<option_check option="-O" label="Operating system detection" short_desc="Attempt to discover the operating system running on remote systems." example=""/>
<option_check option="-sV" label="Version detection" short_desc="Attempt to discover the version number of services running on remote ports." example=""/>
<option_check option="-sI" label="Idle Scan (Zombie)" short_desc="Scan by spoofing packets from a zombie computer so that the targets receive no packets from your IP address. The zombie must meet certain conditions which Nmap will check before scanning." example="zombie.example.com"/>
<option_check option="-b" label="FTP bounce attack" short_desc="Use an FTP server to port scan other hosts by sending a file to each interesting port of a target host." example="username:password@server:port"/>
<option_check option="-n" label="Disable reverse DNS resolution" short_desc="Never do reverse DNS. This can slash scanning times." example=""/>
<option_check option="-6" label="IPv6 support" short_desc="Enable IPv6 scanning." example=""/>
</Scan>
<Ping label="Ping options">
<option_check option="-Pn" label="Don't ping before scanning" short_desc="Don't check if targets are up before scanning them. Scan every target listed." example=""/>
<option_check option="-PE" label="ICMP ping" short_desc="Send an ICMP echo request (ping) probe to see if targets are up." example=""/>
<option_check option="-PP" label="ICMP timestamp request" short_desc="Send an ICMP timestamp probe to see if targets are up." example=""/>
<option_check option="-PM" label="ICMP netmask request" short_desc="Send an ICMP address mask request probe to see if targets are up." example=""/>
<option_check option="-PA" label="ACK ping" short_desc="Send one or more ACK probes to see if targets are up. Give a list of ports or leave the argument blank to use a default port." example="22,53,80"/>
<option_check option="-PS" label="SYN ping" short_desc="Send one or more SYN probes to see if targets are up. Give a list of ports or leave the argument blank to use a default port." example="22,53,80"/>
<option_check option="-PU" label="UDP probes" short_desc="Send one or more UDP probes to see if targets are up. Give a list of ports or leave the argument blank to use a default port." example="100,31338"/>
<option_check option="-PO" label="IPProto probes" short_desc="Send one or more raw IP protocol probes to see if targets are up. Give a list of protocols or leave the argument blank to use a default list" example="1,2,4"/>
<option_check option="-PY" label="SCTP INIT ping probes" short_desc="Send SCTP INIT chunk packets to see if targets are up. Give a list of ports or leave the argument blank to use a default port." example="20,80,179"/>
</Ping>
<Scripting label="Scripting options (NSE)">
<option_check option="-sC" label="Script scan" short_desc="Use the Nmap Scripting Engine to gain more information about targets after scanning them." example=""/>
<option_check option="--script" label="Scripts to run" short_desc="Run the given scripts. Give script names, directory names, or category names. Categories are &quot;safe&quot;, &quot;intrusive&quot;, &quot;malware&quot;, &quot;discovery&quot;, &quot;vuln&quot;, &quot;auth&quot;, &quot;external&quot;, &quot;default&quot;, and &quot;all&quot;. If blank, scripts in the &quot;default&quot; category are run." example="discovery,auth.malware"/>
<option_check option="--script-args" label="Script arguments" short_desc="Give arguments to certain scripts that use them. Arguments are &lt;name&gt;=&lt;value&gt; pairs, separated by commas. Values may be Lua tables." example="user=foo,pass=bar,anonFTP={pass=ftp@foobar.com}"/>
<option_check option="--script-trace" label="Trace script execution" short_desc="Show all information sent and received by the scripting engine." example=""/>
</Scripting>
<Target label="Target options">
<option_check option="--exclude" label="Excluded hosts/networks" short_desc="Specifies a comma-separated list of targets to exclude from the scan." example="scanme.nmap.org,foobar.com"/>
<option_check option="--excludefile" label="Exclusion file" short_desc="Specifies a newline-, space-, or tab-delimited file of targets to exclude from the scan." example="exclude_file.txt"/>
<option_check option="-iL" label="Target list file" short_desc="Reads target list specification from an input file." example="input_file.txt"/>
<option_check option="-iR" label="Scan random hosts" short_desc="Option to choose targets at random. Tells Nmap how many IPs to generate. 0 is used for a never-ending scan." example="10"/>
<option_check option="-p" label="Ports to scan" short_desc="This option specifies which ports you want to scan and overrides the default." example="1-1023,3389"/>
<option_check option="-F" label="Fast scan" short_desc="Only scan ports named in the nmap-services file which comes with Nmap (or nmap-protocols file for -sO)." example=""/>
</Target>
<Source label="Source options">
<option_check option="-D" label="Use decoys to hide identity" short_desc="Send fake decoy probes from spoofed addresses to hide your own address. Give a list of addresses separated by commas. Use RND for a random address and ME to set the position of your address." example="&lt;decoy1&gt;,&lt;decoy2&gt;,ME,RND,RND"/>
<option_check option="-S" label="Set source IP address" short_desc="Specify the IP address of the interface you wish to send packets through." example="64.13.134.52"/>
<option_check option="--source-port" label="Set source port" short_desc="Provide a port number and Nmap will send packets from that port where possible." example="53"/>
<option_check option="-e" label="Set network interface" short_desc="Tells Nmap what interface to send and receive packets on." example="eth0"/>
</Source>
<Other label="Other options">
<option_check option="" label="Extra options defined by user" short_desc="Any extra options to add to the command line." example=""/>
<option_check option="--ttl" label="Set IPv4 time to live (ttl)" short_desc="Set the IPv4 time-to-live field in sent packets to the given value." example="100"/>
<option_check option="-f" label="Fragment IP packets" short_desc="Causes the requested scan (including ping scans) to split up TCP headers over several packets." example=""/>
<option_check option="-v" label="Verbosity level" short_desc="Print more information about the scan in progress. Open ports are shown as they are found as well as completion time estimates." example="4"/>
<option_check option="-d" label="Debugging level" short_desc="When even verbose mode doesn't provide sufficient data for you, debugging level is available to show more detailed output." example="2"/>
<option_check option="--packet-trace" label="Packet trace" short_desc="Print a summary of every packet sent or received." example=""/>
<option_check option="-r" label="Disable randomizing scanned ports" short_desc="Scan ports in order instead of randomizing them." example=""/>
<option_check option="--traceroute" label="Trace routes to targets" short_desc="Trace the network path to each target after scanning. This works with all scan types except connect scan (-sT) and idle scan (-sI)."/>
<option_check option="--max-retries" label="Max Retries" short_desc="Try sending a probe to each port no more than this many times before giving up." example="10"/>
</Other>
<Timing label="Timing and performance">
<option_check option="--host-timeout" label="Max time to scan a target" short_desc="Give up on a host if it has not finished being scanning in this long. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours." example="1s; 4m; 2h"/>
<option_check option="--max-rtt-timeout" label="Max probe timeout" short_desc="Wait no longer than this for a probe response before giving up or retransmitting the probe. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours." example="1s; 4m; 2h"/>
<option_check option="--min-rtt-timeout" label="Min probe timeout" short_desc="Wait at least this long for a probe response before giving up or retransmitting the probe. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours." example="1s; 4m; 2h"/>
<option_check option="--initial-rtt-timeout" label="Initial probe timeout" short_desc="Use the time given as the initial estimate of round-trip time. This can speed up scans if you know a good time for the network you're scanning." example="1s; 4m; 2h"/>
<option_check option="--max-hostgroup" label="Max hosts in parallel" short_desc="Scan no more than this many hosts in parallel." example="1024"/>
<option_check option="--min-hostgroup" label="Min hosts in parallel" short_desc="Scan at least this many hosts in parallel." example="50"/>
<option_check option="--max-parallelism" label="Max outstanding probes" short_desc="Never allow more than the given number of probes to be outstanding at a time. May be set to 1 to prevent Nmap from sending more than one probe at a time to hosts." example="1"/>
<option_check option="--min-parallelism" label="Min outstanding probes" short_desc="Try to maintain at least the given number of probes outstanding during a scan. Common usage is to set to a number higher than 1 to speed up scans of poorly performing hosts or networks." example="10"/>
<option_check option="--max-scan-delay" label="Max scan delay" short_desc="Do not allow the scan delay (time delay between successive probes) to grow larger than the given amount of time. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours." example="20"/>
<option_check option="--scan-delay" label="Min delay between probes" short_desc="Wait at least the given amount of time between each probe sent to a given host. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours." example="4s; 2m"/>
</Timing>
</interface>

File diff suppressed because it is too large Load Diff

After

Width:  |  Height:  |  Size: 82 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.8 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 5.5 KiB

File diff suppressed because it is too large Load Diff

After

Width:  |  Height:  |  Size: 256 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.0 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 6.6 KiB

File diff suppressed because it is too large Load Diff

After

Width:  |  Height:  |  Size: 78 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.5 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 4.7 KiB

File diff suppressed because it is too large Load Diff

After

Width:  |  Height:  |  Size: 251 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.3 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 7.7 KiB

File diff suppressed because it is too large Load Diff

After

Width:  |  Height:  |  Size: 72 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.8 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 5.6 KiB

File diff suppressed because it is too large Load Diff

After

Width:  |  Height:  |  Size: 157 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.1 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 7.3 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 203 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 166 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 30 KiB

View File

@@ -0,0 +1,453 @@
<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!-- Created with Inkscape (http://www.inkscape.org/) -->
<svg
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:cc="http://web.resource.org/cc/"
xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
xmlns:svg="http://www.w3.org/2000/svg"
xmlns="http://www.w3.org/2000/svg"
xmlns:xlink="http://www.w3.org/1999/xlink"
xmlns:sodipodi="http://sodipodi.sourceforge.net/DTD/sodipodi-0.dtd"
xmlns:inkscape="http://www.inkscape.org/namespaces/inkscape"
width="750"
height="750"
id="svg2"
sodipodi:version="0.32"
inkscape:version="0.45.1"
inkscape:export-filename="/home/ignotus/work/radialnet/share/pixmaps/logotest.png"
inkscape:export-xdpi="30.719999"
inkscape:export-ydpi="30.719999"
version="1.0"
sodipodi:docbase="/home/ignotus/work/radialnet/share/pixmaps/src"
sodipodi:docname="logo.svg"
inkscape:output_extension="org.inkscape.output.svg.inkscape">
<defs
id="defs4">
<linearGradient
inkscape:collect="always"
id="linearGradient3325">
<stop
style="stop-color:#00ff00;stop-opacity:1;"
offset="0"
id="stop3327" />
<stop
style="stop-color:#00ff00;stop-opacity:0;"
offset="1"
id="stop3329" />
</linearGradient>
<filter
inkscape:collect="always"
id="filter3296">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="8.008574"
id="feGaussianBlur3298" />
</filter>
<filter
inkscape:collect="always"
x="-0.60000002"
width="2.2"
y="-0.60000002"
height="2.2"
id="filter3472">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="5.2206955"
id="feGaussianBlur3474" />
</filter>
<filter
inkscape:collect="always"
x="-0.47999999"
width="1.96"
y="-0.47999999"
height="1.96"
id="filter3476">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="4.1765564"
id="feGaussianBlur3478" />
</filter>
<filter
inkscape:collect="always"
x="-0.36000001"
width="1.72"
y="-0.36000001"
height="1.72"
id="filter3482">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="3.1324173"
id="feGaussianBlur3484" />
</filter>
<filter
inkscape:collect="always"
x="-0.30000001"
width="1.6"
y="-0.30000001"
height="1.6"
id="filter3488">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="2.6103477"
id="feGaussianBlur3490" />
</filter>
<filter
inkscape:collect="always"
x="-0.18000001"
width="1.36"
y="-0.18000001"
height="1.36"
id="filter3504">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="1.5662086"
id="feGaussianBlur3506" />
</filter>
<filter
inkscape:collect="always"
x="-0.12"
width="1.24"
y="-0.12"
height="1.24"
id="filter3508">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="1.0441391"
id="feGaussianBlur3510" />
</filter>
<filter
inkscape:collect="always"
x="-0.95999998"
width="2.9200001"
y="-0.95999998"
height="2.9200001"
id="filter3516">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="8.3531128"
id="feGaussianBlur3518" />
</filter>
<filter
inkscape:collect="always"
x="-1.02"
width="3.04"
y="-1.02"
height="3.04"
id="filter3520">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="8.8751823"
id="feGaussianBlur3522" />
</filter>
<filter
inkscape:collect="always"
x="-0.95999998"
width="2.9200001"
y="-0.95999998"
height="2.9200001"
id="filter3530">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="8.3531128"
id="feGaussianBlur3532" />
</filter>
<linearGradient
inkscape:collect="always"
xlink:href="#linearGradient3325"
id="linearGradient4534"
gradientUnits="userSpaceOnUse"
gradientTransform="matrix(0.9659258,-0.258819,0.258819,0.9659258,208.40806,114.60926)"
x1="94.129921"
y1="134.43347"
x2="152.12218"
y2="149.97244" />
<filter
inkscape:collect="always"
id="filter4566">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="5.7732865"
id="feGaussianBlur4568" />
</filter>
<filter
inkscape:collect="always"
id="filter5547">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="4.1895875"
id="feGaussianBlur5549" />
</filter>
<filter
inkscape:collect="always"
id="filter5555">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="2.7864285"
id="feGaussianBlur5557" />
</filter>
<filter
inkscape:collect="always"
x="-0.6"
width="2.2"
y="-0.6"
height="2.2"
id="filter5559">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="5.2206955"
id="feGaussianBlur5561" />
</filter>
<filter
inkscape:collect="always"
x="-0.72"
width="2.44"
y="-0.72"
height="2.44"
id="filter5563">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="6.2648346"
id="feGaussianBlur5565" />
</filter>
<filter
inkscape:collect="always"
x="-0.84"
width="2.68"
y="-0.84"
height="2.68"
id="filter5567">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="7.3089737"
id="feGaussianBlur5569" />
</filter>
<filter
inkscape:collect="always"
id="filter5575">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="16.285715"
id="feGaussianBlur5577" />
</filter>
<filter
inkscape:collect="always"
id="filter5603">
<feGaussianBlur
inkscape:collect="always"
stdDeviation="3.8733981"
id="feGaussianBlur5605" />
</filter>
</defs>
<sodipodi:namedview
id="base"
pagecolor="#ffffff"
bordercolor="#666666"
borderopacity="1.0"
gridtolerance="10000"
guidetolerance="10"
objecttolerance="10"
inkscape:pageopacity="0.0"
inkscape:pageshadow="2"
inkscape:zoom="0.66911453"
inkscape:cx="377.19525"
inkscape:cy="370.66938"
inkscape:document-units="px"
inkscape:current-layer="layer1"
showguides="true"
inkscape:guide-bbox="true"
width="750px"
height="750px"
inkscape:window-width="1024"
inkscape:window-height="718"
inkscape:window-x="0"
inkscape:window-y="0" />
<metadata
id="metadata7">
<rdf:RDF>
<cc:Work
rdf:about="">
<dc:format>image/svg+xml</dc:format>
<dc:type
rdf:resource="http://purl.org/dc/dcmitype/StillImage" />
</cc:Work>
</rdf:RDF>
</metadata>
<g
inkscape:label="Layer 1"
inkscape:groupmode="layer"
id="layer1">
<rect
style="fill:#000000;fill-opacity:1;stroke:none;stroke-width:1;stroke-linecap:square;stroke-miterlimit:4;stroke-dasharray:none;stroke-opacity:1;filter:url(#filter5575)"
id="rect2160"
width="651.42859"
height="651.42859"
x="49.285702"
y="52.462269"
rx="182.85715"
ry="182.85715"
inkscape:export-xdpi="27.631578"
inkscape:export-ydpi="27.631578"
inkscape:export-filename="/home/ignotus/work/radialnet/share/pixmaps/logotest.png" />
<text
xml:space="preserve"
style="font-size:754.49682617px;font-style:normal;font-variant:normal;font-weight:normal;font-stretch:normal;text-align:start;line-height:125%;writing-mode:lr-tb;text-anchor:start;fill:#808080;fill-opacity:1;stroke:none;stroke-width:1px;stroke-linecap:butt;stroke-linejoin:miter;stroke-opacity:1;filter:url(#filter5603);font-family:Courier 10 Pitch"
x="159.17917"
y="593.94568"
id="text5579"
sodipodi:linespacing="125%"
transform="matrix(0.995022,0,0,0.995022,-14.035751,1.8317922)"><tspan
sodipodi:role="line"
id="tspan5581"
x="159.17917"
y="593.94568">R</tspan></text>
<path
sodipodi:type="arc"
style="fill:none;fill-opacity:1;stroke:#4dff00;stroke-width:3;stroke-linecap:square;stroke-miterlimit:4;stroke-dasharray:24,6,3,6;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter5555)"
id="path2162"
sodipodi:cx="-17.142857"
sodipodi:cy="240.93361"
sodipodi:rx="277.14285"
sodipodi:ry="277.14285"
d="M 260 240.93361 A 277.14285 277.14285 0 1 1 -294.28571,240.93361 A 277.14285 277.14285 0 1 1 260 240.93361 z"
transform="translate(392.14285,137.24295)" />
<path
sodipodi:type="arc"
style="fill:none;fill-opacity:1;stroke:#4dff00;stroke-width:4.32596679;stroke-linecap:square;stroke-miterlimit:4;stroke-dasharray:34.60773431,8.65193358,4.32596679,8.65193358;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter5547)"
id="path3134"
sodipodi:cx="-17.142857"
sodipodi:cy="240.93361"
sodipodi:rx="277.14285"
sodipodi:ry="277.14285"
d="M 260 240.93361 A 277.14285 277.14285 0 1 1 -294.28571,240.93361 A 277.14285 277.14285 0 1 1 260 240.93361 z"
transform="matrix(0.6934866,0,0,0.6934866,386.88834,211.09233)" />
<path
sodipodi:type="arc"
style="fill:#00ff00;fill-opacity:1;stroke:none;stroke-width:1;stroke-linecap:round;stroke-miterlimit:4.4000001;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter3472)"
id="path3336"
sodipodi:cx="208.82782"
sodipodi:cy="200.08363"
sodipodi:rx="10.441391"
sodipodi:ry="10.441391"
d="M 219.26921 200.08363 A 10.441391 10.441391 0 1 1 198.38643,200.08363 A 10.441391 10.441391 0 1 1 219.26921 200.08363 z"
transform="translate(343.8063,244.55955)" />
<rect
style="fill:#00ff00;fill-opacity:1;stroke:none;stroke-width:1;stroke-linecap:round;stroke-miterlimit:4.4000001;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter3476)"
id="rect3338"
width="20.882782"
height="20.882782"
x="637.4704"
y="330.90372"
rx="0"
ry="0" />
<path
sodipodi:type="arc"
style="fill:#00ff00;fill-opacity:1;stroke:none;stroke-width:1;stroke-linecap:round;stroke-miterlimit:4.4000001;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter3482)"
id="path3480"
sodipodi:cx="208.82782"
sodipodi:cy="200.08363"
sodipodi:rx="10.441391"
sodipodi:ry="10.441391"
d="M 219.26921 200.08363 A 10.441391 10.441391 0 1 1 198.38643,200.08363 A 10.441391 10.441391 0 1 1 219.26921 200.08363 z"
transform="translate(166.17218,178.09293)" />
<rect
style="fill:#00ff00;fill-opacity:1;stroke:none;stroke-width:1;stroke-linecap:round;stroke-miterlimit:4.4000001;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter3488)"
id="rect3486"
width="20.882782"
height="20.882782"
x="601.85205"
y="235.62602"
rx="0"
ry="0" />
<rect
style="fill:#00ff00;fill-opacity:1;stroke:none;stroke-width:1;stroke-linecap:round;stroke-miterlimit:4.4000001;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter3504)"
id="rect3492"
width="20.882782"
height="20.882782"
x="364.55859"
y="177.28812"
rx="0"
ry="0" />
<path
sodipodi:type="arc"
style="fill:#00ff00;fill-opacity:1;stroke:none;stroke-width:1;stroke-linecap:round;stroke-miterlimit:4.4000001;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter3508)"
id="path3498"
sodipodi:cx="208.82782"
sodipodi:cy="200.08363"
sodipodi:rx="10.441391"
sodipodi:ry="10.441391"
d="M 219.26921 200.08363 A 10.441391 10.441391 0 1 1 198.38643,200.08363 A 10.441391 10.441391 0 1 1 219.26921 200.08363 z"
transform="translate(266.42237,-80.618075)" />
<path
sodipodi:type="arc"
style="fill:#00ff00;fill-opacity:1;stroke:none;stroke-width:1;stroke-linecap:round;stroke-miterlimit:4.4000001;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter5559)"
id="path3512"
sodipodi:cx="208.82782"
sodipodi:cy="200.08363"
sodipodi:rx="10.441391"
sodipodi:ry="10.441391"
d="M 219.26921 200.08363 A 10.441391 10.441391 0 1 1 198.38643,200.08363 A 10.441391 10.441391 0 1 1 219.26921 200.08363 z"
transform="translate(426.97896,275.88372)" />
<path
sodipodi:type="arc"
style="fill:#00ff00;fill-opacity:1;stroke:none;stroke-width:1;stroke-linecap:round;stroke-miterlimit:4.4000001;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter3516)"
id="path3514"
sodipodi:cx="208.82782"
sodipodi:cy="200.08363"
sodipodi:rx="10.441391"
sodipodi:ry="10.441391"
d="M 219.26921 200.08363 A 10.441391 10.441391 0 1 1 198.38643,200.08363 A 10.441391 10.441391 0 1 1 219.26921 200.08363 z"
transform="translate(-11.57966,240.4547)" />
<path
sodipodi:type="arc"
style="fill:#00ff00;fill-opacity:1;stroke:none;stroke-width:1;stroke-linecap:round;stroke-miterlimit:4.4000001;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter5567)"
id="path3524"
sodipodi:cx="208.82782"
sodipodi:cy="200.08363"
sodipodi:rx="10.441391"
sodipodi:ry="10.441391"
d="M 219.26921 200.08363 A 10.441391 10.441391 0 1 1 198.38643,200.08363 A 10.441391 10.441391 0 1 1 219.26921 200.08363 z"
transform="translate(256.88728,436.62966)" />
<path
sodipodi:type="arc"
style="fill:#00ff00;fill-opacity:1;stroke:none;stroke-width:1;stroke-linecap:round;stroke-miterlimit:4.4000001;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter3520)"
id="path3526"
sodipodi:cx="208.82782"
sodipodi:cy="200.08363"
sodipodi:rx="10.441391"
sodipodi:ry="10.441391"
d="M 219.26921 200.08363 A 10.441391 10.441391 0 1 1 198.38643,200.08363 A 10.441391 10.441391 0 1 1 219.26921 200.08363 z"
transform="translate(-45.51418,352.69965)" />
<rect
style="fill:#00ff00;fill-opacity:1;stroke:none;stroke-width:1;stroke-linecap:round;stroke-miterlimit:4.4000001;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter5563)"
id="rect3528"
width="20.882782"
height="20.882782"
x="544.42444"
y="571.05573"
rx="0"
ry="0" />
<rect
style="fill:#00ff00;fill-opacity:1;stroke:none;stroke-width:1;stroke-linecap:round;stroke-miterlimit:4.4000001;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter3530)"
id="rect3535"
width="20.882782"
height="20.882782"
x="92.834236"
y="375.27963"
rx="0"
ry="0" />
<rect
style="fill:#00ff00;fill-opacity:1;stroke:none;stroke-width:1;stroke-linecap:round;stroke-miterlimit:4.4000001;stroke-dasharray:none;stroke-dashoffset:0;stroke-opacity:1;filter:url(#filter3530)"
id="rect3537"
width="20.882782"
height="20.882782"
x="301.66208"
y="101.19313"
rx="0"
ry="0" />
<path
id="path3302"
style="fill:url(#linearGradient4534);fill-opacity:1.0;fill-rule:evenodd;stroke:none;stroke-width:1;stroke-linecap:butt;stroke-linejoin:miter;stroke-miterlimit:4.4000001;stroke-dasharray:none;stroke-opacity:1;filter:url(#filter4566)"
d="M 452.24112,100.01675 L 373.67338,393.25986 L 295.10564,99.832723 C 295.10564,99.832723 368.26123,74.284803 452.24112,100.01675 z "
sodipodi:nodetypes="ccc" />
</g>
</svg>

After

Width:  |  Height:  |  Size: 16 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 198 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 193 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 203 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 189 B

File diff suppressed because it is too large Load Diff

After

Width:  |  Height:  |  Size: 34 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.6 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 4.8 KiB

File diff suppressed because it is too large Load Diff

After

Width:  |  Height:  |  Size: 110 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.0 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 6.6 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 459 B

Binary file not shown.

After

Width:  |  Height:  |  Size: 219 B

File diff suppressed because it is too large Load Diff

After

Width:  |  Height:  |  Size: 80 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 2.1 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 6.6 KiB

File diff suppressed because it is too large Load Diff

After

Width:  |  Height:  |  Size: 85 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.9 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 5.8 KiB

File diff suppressed because it is too large Load Diff

After

Width:  |  Height:  |  Size: 33 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.6 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 4.5 KiB

File diff suppressed because it is too large Load Diff

After

Width:  |  Height:  |  Size: 31 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.5 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 4.4 KiB

File diff suppressed because it is too large Load Diff

After

Width:  |  Height:  |  Size: 22 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.5 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 4.1 KiB

File diff suppressed because it is too large Load Diff

After

Width:  |  Height:  |  Size: 49 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.2 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 3.5 KiB

File diff suppressed because it is too large Load Diff

After

Width:  |  Height:  |  Size: 83 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.7 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 5.0 KiB

File diff suppressed because it is too large Load Diff

After

Width:  |  Height:  |  Size: 38 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 1.6 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 4.5 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 44 KiB