mirror of
https://github.com/nmap/nmap.git
synced 2026-01-27 08:39:02 +00:00
About to work on Nmap infinite loop reported by everdream
This commit is contained in:
@@ -2,7 +2,7 @@
|
||||
.\" It was generated using the DocBook XSL Stylesheets (version 1.69.1).
|
||||
.\" Instead of manually editing it, you probably should edit the DocBook XML
|
||||
.\" source for it and then use the DocBook XSL Stylesheets to regenerate it.
|
||||
.TH "NMAP" "1" "02/09/2006" "" "Nmap Reference Guide"
|
||||
.TH "NMAP" "1" "02/16/2006" "" "Nmap Reference Guide"
|
||||
.\" disable hyphenation
|
||||
.nh
|
||||
.\" disable justification (adjust text to left margin only)
|
||||
@@ -192,7 +192,7 @@ CIDR notation is short but not always flexible enough. For example, you might wa
|
||||
IPv6 addresses can only be specified by their fully qualified IPv6 address or hostname. CIDR and octet ranges aren't supported for IPv6 because they are rarely useful.
|
||||
.PP
|
||||
Nmap accepts multiple host specifications on the command line, and they don't need to be the same type. The command
|
||||
\fBnmap scanme.nmap.org 192.168.0.0/8 10.0.0,1,3\-7.0\-255\fR
|
||||
\fBnmap scanme.nmap.org 192.168.0.0/16 10.0.0,1,3\-7.0\-255\fR
|
||||
does what you would expect.
|
||||
.PP
|
||||
While targets are usually specified on the command lines, the following options are also available to control target selection:
|
||||
@@ -656,7 +656,7 @@ database contains probes for querying various services and match expressions to
|
||||
open|filtered
|
||||
state after a UDP port scan is unable to determine whether the port is open or filtered. Version detection will try to elicit a response from these ports (just as it does with open ports), and change the state to open if it succeeds.
|
||||
open|filtered
|
||||
TCP ports are treaded the same way. Note that the Nmap
|
||||
TCP ports are treated the same way. Note that the Nmap
|
||||
\fB\-A\fR
|
||||
option enables version detection among other things. A paper documenting the workings, usage, and customization of version detection is available at
|
||||
\fI\%http://www.insecure.org/nmap/vscan/\fR.
|
||||
@@ -685,7 +685,7 @@ When performing a version scan (\fB\-sV\fR), nmap sends a series of probes, each
|
||||
\fInmap\-service\-probes\fRports
|
||||
directive, that probe is tried regardless of intensity level. This ensures that the DNS probes will always be attempted against any open port 53, the SSL probe will be done against 443, etc.
|
||||
.TP
|
||||
\fB\-\-version\-light\fR (Enablie light mode)
|
||||
\fB\-\-version\-light\fR (Enable light mode)
|
||||
This is a convenience alias for
|
||||
\fB\-\-version\-intensity 2\fR. This light mode makes version scanning much faster, but it is slightly less likely to identify services.
|
||||
.TP
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
Nmap 4.00 ( http://www.insecure.org/nmap/ )
|
||||
Nmap 4.01 ( http://www.insecure.org/nmap/ )
|
||||
Usage: nmap [Scan Type(s)] [Options] {target specification}
|
||||
TARGET SPECIFICATION:
|
||||
Can pass hostnames, IP addresses, networks, etc.
|
||||
|
||||
Reference in New Issue
Block a user