1
0
mirror of https://github.com/nmap/nmap.git synced 2025-12-29 19:09:01 +00:00

trivial rewording

This commit is contained in:
fyodor
2008-07-07 19:13:08 +00:00
parent 5c79c3585a
commit da2db6f595

View File

@@ -411,16 +411,16 @@ you would expect.</para>
</term>
<listitem>
<para>This option tells Nmap to only perform a ping scan
(host discovery), then print out the available hosts
that responded to the scan. If requested, Traceroute and
NSE host scripts can be run against the target after the
ping scan, but no other further testing (such as
port scanning or OS detection) is performed. This is by
default one step more intrusive than the list scan, and can often be
used for the same purposes. It allows light reconnaissance
of a target network without attracting much attention.
Knowing how many hosts are up is more valuable to attackers
than the list provided by list scan of every single IP and host name.</para>
(host discovery), then print out the available hosts that
responded to the scan. Traceroute and NSE host scripts are
also run if requested, but no further testing (such as port
scanning or OS detection) is performed. This is by default
one step more intrusive than the list scan, and can often
be used for the same purposes. It allows light
reconnaissance of a target network without attracting much
attention. Knowing how many hosts are up is more valuable
to attackers than the list provided by list scan of every
single IP and host name.</para>
<para>Systems administrators often find this option
valuable as well. It can easily be used to count available