diff --git a/docs/nmap.1 b/docs/nmap.1 index 95f9b37a2..dc4ece880 100644 --- a/docs/nmap.1 +++ b/docs/nmap.1 @@ -353,9 +353,7 @@ This host discovery is often sufficient when scanning local networks, but a more .PP The \fB\-P*\fR -options (which select ping types) can be combined\&. You can increase your odds of penetrating strict firewalls by sending many probe types using different TCP ports/flags and ICMP codes\&. Also note that ARP/Neighbor Discovery - -is done by default against targets on a local Ethernet network even if you specify other +options (which select ping types) can be combined\&. You can increase your odds of penetrating strict firewalls by sending many probe types using different TCP ports/flags and ICMP codes\&. Also note that ARP/Neighbor Discovery is done by default against targets on a local Ethernet network even if you specify other \fB\-P*\fR options, because it is almost always faster and more effective\&. .PP diff --git a/docs/refguide.xml b/docs/refguide.xml index 5378cf47d..01b454587 100644 --- a/docs/refguide.xml +++ b/docs/refguide.xml @@ -388,7 +388,7 @@ you would expect. ping types) can be combined. You can increase your odds of penetrating strict firewalls by sending many probe types using different TCP ports/flags and ICMP codes. Also note that - ARP/Neighbor Discovery ARP ping + ARP/Neighbor DiscoveryARP ping is done by default against targets on a local Ethernet network even if you specify other options, because it is almost always faster