1
0
mirror of https://github.com/nmap/nmap.git synced 2026-01-27 08:39:02 +00:00

About to work on Nmap infinite loop reported by everdream

This commit is contained in:
fyodor
2006-02-16 22:50:02 +00:00
parent 311300b550
commit bd46c3ae39
6 changed files with 28 additions and 20 deletions

View File

@@ -2,7 +2,7 @@
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.1).
.\" Instead of manually editing it, you probably should edit the DocBook XML
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
.TH "NMAP" "1" "02/09/2006" "" "Nmap Reference Guide"
.TH "NMAP" "1" "02/16/2006" "" "Nmap Reference Guide"
.\" disable hyphenation
.nh
.\" disable justification (adjust text to left margin only)
@@ -192,7 +192,7 @@ CIDR notation is short but not always flexible enough. For example, you might wa
IPv6 addresses can only be specified by their fully qualified IPv6 address or hostname. CIDR and octet ranges aren't supported for IPv6 because they are rarely useful.
.PP
Nmap accepts multiple host specifications on the command line, and they don't need to be the same type. The command
\fBnmap scanme.nmap.org 192.168.0.0/8 10.0.0,1,3\-7.0\-255\fR
\fBnmap scanme.nmap.org 192.168.0.0/16 10.0.0,1,3\-7.0\-255\fR
does what you would expect.
.PP
While targets are usually specified on the command lines, the following options are also available to control target selection:
@@ -656,7 +656,7 @@ database contains probes for querying various services and match expressions to
open|filtered
state after a UDP port scan is unable to determine whether the port is open or filtered. Version detection will try to elicit a response from these ports (just as it does with open ports), and change the state to open if it succeeds.
open|filtered
TCP ports are treaded the same way. Note that the Nmap
TCP ports are treated the same way. Note that the Nmap
\fB\-A\fR
option enables version detection among other things. A paper documenting the workings, usage, and customization of version detection is available at
\fI\%http://www.insecure.org/nmap/vscan/\fR.
@@ -685,7 +685,7 @@ When performing a version scan (\fB\-sV\fR), nmap sends a series of probes, each
\fInmap\-service\-probes\fRports
directive, that probe is tried regardless of intensity level. This ensures that the DNS probes will always be attempted against any open port 53, the SSL probe will be done against 443, etc.
.TP
\fB\-\-version\-light\fR (Enablie light mode)
\fB\-\-version\-light\fR (Enable light mode)
This is a convenience alias for
\fB\-\-version\-intensity 2\fR. This light mode makes version scanning much faster, but it is slightly less likely to identify services.
.TP

View File

@@ -1,4 +1,4 @@
Nmap 4.00 ( http://www.insecure.org/nmap/ )
Nmap 4.01 ( http://www.insecure.org/nmap/ )
Usage: nmap [Scan Type(s)] [Options] {target specification}
TARGET SPECIFICATION:
Can pass hostnames, IP addresses, networks, etc.