From da2db6f595705744a43fb8ac76e5729d5b6fc1dc Mon Sep 17 00:00:00 2001 From: fyodor Date: Mon, 7 Jul 2008 19:13:08 +0000 Subject: [PATCH] trivial rewording --- docs/refguide.xml | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/docs/refguide.xml b/docs/refguide.xml index 64307e24b..738cb7232 100644 --- a/docs/refguide.xml +++ b/docs/refguide.xml @@ -411,16 +411,16 @@ you would expect. This option tells Nmap to only perform a ping scan - (host discovery), then print out the available hosts - that responded to the scan. If requested, Traceroute and - NSE host scripts can be run against the target after the - ping scan, but no other further testing (such as - port scanning or OS detection) is performed. This is by - default one step more intrusive than the list scan, and can often be - used for the same purposes. It allows light reconnaissance - of a target network without attracting much attention. - Knowing how many hosts are up is more valuable to attackers - than the list provided by list scan of every single IP and host name. + (host discovery), then print out the available hosts that + responded to the scan. Traceroute and NSE host scripts are + also run if requested, but no further testing (such as port + scanning or OS detection) is performed. This is by default + one step more intrusive than the list scan, and can often + be used for the same purposes. It allows light + reconnaissance of a target network without attracting much + attention. Knowing how many hosts are up is more valuable + to attackers than the list provided by list scan of every + single IP and host name. Systems administrators often find this option valuable as well. It can easily be used to count available