From cccf694c7b3ab010fbf97302140be1f393d47f87 Mon Sep 17 00:00:00 2001 From: fyodor Date: Fri, 24 Aug 2007 11:49:35 +0000 Subject: [PATCH] change dashes to the appropriate versions, change dump quotes to smart (curly) ones, capitalization canonicalization, proofreading --- docs/refguide.xml | 30 +++++++++++++++--------------- 1 file changed, 15 insertions(+), 15 deletions(-) diff --git a/docs/refguide.xml b/docs/refguide.xml index c9de49185..1079f48b2 100644 --- a/docs/refguide.xml +++ b/docs/refguide.xml @@ -1104,7 +1104,7 @@ means it is open|filtered. The port is marked The key advantage to these scan types is that they can sneak through certain non-stateful firewalls and packet filtering routers. Another advantage is that these scan types are a little more -stealthy than even a SYN scan. Don't count on this though -- most +stealthy than even a SYN scan. Don't count on this though—most modern IDS products can be configured to detect them. The big downside is that not all systems follow RFC 793 to the letter. A number of systems send RST responses to the probes regardless of @@ -1469,14 +1469,14 @@ way. that ports 25/tcp, 80/tcp, and 53/udp are open. Using its nmap-services database of about 2,200 well-known services, Nmap would report that those ports probably correspond to a - mail server (SMTP), web server (HTTP), and name server (DNS) - respectively. This lookup is usually accurate -- the vast + mail server (smtp), web server (http), and name server (DNS) + respectively. This lookup is usually accurate—the vast majority of daemons listening on TCP port 25 are, in fact, mail servers. However, you should not bet your security on this! People can and do run services on strange ports. Even if Nmap is right, and the hypothetical server above is - running SMTP, HTTP, and DNS servers, that is not a lot of + running smtp, http, and dns servers, that is not a lot of information. When doing vulnerability assessments (or even simple network inventories) of your companies or clients, you really want to know which mail and DNS servers and versions are @@ -1550,7 +1550,7 @@ way. --allports By default, Nmap version detection skips TCP port 9100 because some printers simply print anything sent to that - port, leading to dozens of pages of HTTP get requests, binary + port, leading to dozens of pages of http get requests, binary SSL session requests, etc. This behavior can be changed by modifying or removing the Exclude directive in nmap-service-probes, or @@ -1820,9 +1820,9 @@ way. - NSE - Scripting extension to the Nmap network scanner + NSE—Scripting extension to the Nmap network scanner - NSE - Scripting extension to the Nmap network scanner + NSE The Nmap Scripting Engine (NSE) combines the efficiency of Nmap's @@ -1837,7 +1837,7 @@ way. Enhanced Version-detection (category - version) - While Nmap already offers its Service and + version)—While Nmap already offers its Service and Version detection system, which is unmatched in terms of efficiency and scope, this power has its downside when it comes to services requiring more complex probes. The Skype-Protocol version 2 for instance can be identified @@ -1849,7 +1849,7 @@ way. Malware-detection (categories malware and backdoor)- Both attackers - and worms often leave backdoors - be it in form of SMTP-servers listening on + and worms often leave backdoors—be it in form of SMTP-servers listening on uncommon ports mostly used by spammers for mail relay, or in form of an FTP-server giving crackers access to critical data. A few lines of lua code can help to identify those loopholes easily. @@ -1864,11 +1864,11 @@ way. Network Discovery and Information Gathering (categories safe, intrusive and - discovery) - By providing you with a scripting language + discovery)—By providing you with a scripting language and a really efficient asynchronous network API on the one hand and the information gathered during earlier stages of a scan on the other hand the - NSE is suited to write "client" programs for the services listening on a - target machine. These "clients" may collect information like: listings of + NSE is suited to write client programs for the services listening on a + target machine. These clients may collect information like: listings of available NFS/SMB/RPC shares, the number of channels of an irc-network or currently logged on users. @@ -1966,7 +1966,7 @@ way. t={user="bar",password="foo",anonFTP={password="nobody@foobar.com"}. Note, that if you want to override an option to a script, you should index the subtable with the script's id, since this - is the only way the script can "know" about it's special argument. + is the only way the script knows about its special argument. @@ -2309,7 +2309,7 @@ section are powerful and effective, some people find them confusing. Moreover, choosing the appropriate values can sometimes take more time than the scan you are trying to optimize. So Nmap offers a simpler approach, with six timing templates. You can specify them with the - option and their number (0 - 5) or their name. + option and their number (0–5) or their name. The template names are paranoid (0), sneaky (1), polite (2), normal (3), aggressive (4), and insane (5). The first two are for IDS evasion. Polite mode slows down the scan to use less bandwidth and @@ -3127,7 +3127,7 @@ overwhelming requests. Specify to only see --resume - Some extensive Nmap runs take a very long time -- on + Some extensive Nmap runs take a very long time—on the order of days. Such scans don't always run to completion. Restrictions may prevent Nmap from being run during working hours, the network could go down, the machine