diff --git a/docs/refguide.xml b/docs/refguide.xml index 1fbec192b..f495b809f 100644 --- a/docs/refguide.xml +++ b/docs/refguide.xml @@ -366,10 +366,9 @@ you would expect. even if you specify non-default host discovery types such as UDP probes (). Read about the option to learn how to perform - only host discovery, or use - to skip host discovery and port scan all - target hosts. The following options control host - discovery: + only host discovery, or use to skip host + discovery and port scan all target hosts. The following options + control host discovery: @@ -411,11 +410,13 @@ you would expect. ping scan - This option tells Nmap to only - perform a ping scan (host discovery), then print out the available hosts - that responded to the scan. No further testing (such as - port scanning or OS detection) is performed. This is one - step more intrusive than the list scan, and can often be + This option tells Nmap to only perform a ping scan + (host discovery), then print out the available hosts + that responded to the scan. If requested, Traceroute and + NSE host scripts can be run against the target after the + ping scan, but no other further testing (such as + port scanning or OS detection) is performed. This is by + default one step more intrusive than the list scan, and can often be used for the same purposes. It allows light reconnaissance of a target network without attracting much attention. Knowing how many hosts are up is more valuable to attackers