mirror of
https://github.com/nmap/nmap.git
synced 2025-12-29 02:49:01 +00:00
Update http urls for nmap.org to https
This commit is contained in:
@@ -2,12 +2,12 @@
|
||||
.\" Title: Ncat
|
||||
.\" Author: [see the "Authors" section]
|
||||
.\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/>
|
||||
.\" Date: 07/08/2015
|
||||
.\" Date: 11/05/2015
|
||||
.\" Manual: Ncat Reference Guide
|
||||
.\" Source: Ncat
|
||||
.\" Language: English
|
||||
.\"
|
||||
.TH "NCAT" "1" "07/08/2015" "Ncat" "Ncat Reference Guide"
|
||||
.TH "NCAT" "1" "11/05/2015" "Ncat" "Ncat Reference Guide"
|
||||
.\" -----------------------------------------------------------------
|
||||
.\" * Define some portability stuff
|
||||
.\" -----------------------------------------------------------------
|
||||
@@ -43,7 +43,7 @@ Among Ncat\*(Aqs vast number of features there is the ability to chain Ncats tog
|
||||
.RS 4
|
||||
.\}
|
||||
.nf
|
||||
Ncat 6\&.49SVN ( http://nmap\&.org/ncat )
|
||||
Ncat 6\&.49SVN ( https://nmap\&.org/ncat )
|
||||
Usage: ncat [options] [hostname] [port]
|
||||
|
||||
Options taking a time assume seconds\&. Append \*(Aqms\*(Aq for milliseconds,
|
||||
@@ -85,12 +85,6 @@ Options taking a time assume seconds\&. Append \*(Aqms\*(Aq for milliseconds,
|
||||
\-\-proxy <addr[:port]> Specify address of host to proxy through
|
||||
\-\-proxy\-type <type> Specify proxy type ("http" or "socks4" or "socks5")
|
||||
\-\-proxy\-auth <auth> Authenticate with HTTP or SOCKS proxy server
|
||||
\-\-ssl Connect or listen with SSL
|
||||
\-\-ssl\-cert Specify SSL certificate file (PEM) for listening
|
||||
\-\-ssl\-key Specify SSL private key (PEM) for listening
|
||||
\-\-ssl\-verify Verify trust and domain name of certificates
|
||||
\-\-ssl\-trustfile PEM file containing trusted SSL certificates
|
||||
\-\-ssl\-ciphers Cipherlist containing SSL ciphers to use
|
||||
\-\-version Display Ncat\*(Aqs version information and exit
|
||||
|
||||
See the ncat(1) manpage for full options, descriptions and usage examples
|
||||
@@ -562,7 +556,7 @@ or
|
||||
.SH "BUGS"
|
||||
.PP
|
||||
Like its authors, Ncat isn\*(Aqt perfect\&. But you can help make it better by sending bug reports or even writing patches\&. If Ncat doesn\*(Aqt behave the way you expect, first upgrade to the latest version available from
|
||||
\m[blue]\fB\%http://nmap.org\fR\m[]\&. If the problem persists, do some research to determine whether it has already been discovered and addressed\&. Try Googling the error message or browsing the
|
||||
\m[blue]\fB\%https://nmap.org\fR\m[]\&. If the problem persists, do some research to determine whether it has already been discovered and addressed\&. Try Googling the error message or browsing the
|
||||
nmap\-dev
|
||||
archives at
|
||||
\m[blue]\fB\%http://seclists.org/\fR\m[]\&.
|
||||
@@ -635,7 +629,7 @@ Netcat (or any other implementation), Ncat is most definitely based on Netcat in
|
||||
.\" GNU General Public License
|
||||
.PP
|
||||
Ncat is (C) 2005\(en2012 Insecure\&.Com LLC\&. It is distributed as free and open source software under the same license terms as our Nmap software\&. Precise terms and further details are available
|
||||
from \m[blue]\fB\%http://nmap.org/man/man-legal.html\fR\m[]\&.
|
||||
from \m[blue]\fB\%https://nmap.org/man/man-legal.html\fR\m[]\&.
|
||||
.SS "Creative Commons License for this Ncat Guide"
|
||||
.PP
|
||||
This
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
Ncat 6.49SVN ( http://nmap.org/ncat )
|
||||
Ncat 6.49SVN ( https://nmap.org/ncat )
|
||||
Usage: ncat [options] [hostname] [port]
|
||||
|
||||
Options taking a time assume seconds. Append 'ms' for milliseconds,
|
||||
@@ -40,12 +40,6 @@ Options taking a time assume seconds. Append 'ms' for milliseconds,
|
||||
--proxy <addr[:port]> Specify address of host to proxy through
|
||||
--proxy-type <type> Specify proxy type ("http" or "socks4" or "socks5")
|
||||
--proxy-auth <auth> Authenticate with HTTP or SOCKS proxy server
|
||||
--ssl Connect or listen with SSL
|
||||
--ssl-cert Specify SSL certificate file (PEM) for listening
|
||||
--ssl-key Specify SSL private key (PEM) for listening
|
||||
--ssl-verify Verify trust and domain name of certificates
|
||||
--ssl-trustfile PEM file containing trusted SSL certificates
|
||||
--ssl-ciphers Cipherlist containing SSL ciphers to use
|
||||
--version Display Ncat's version information and exit
|
||||
|
||||
See the ncat(1) manpage for full options, descriptions and usage examples
|
||||
|
||||
@@ -936,7 +936,7 @@
|
||||
it better by sending bug reports or even writing patches. If Ncat
|
||||
doesn't behave the way you expect, first upgrade to the latest
|
||||
version available from <ulink
|
||||
url="http://nmap.org"/>. If the problem persists,
|
||||
url="https://nmap.org"/>. If the problem persists,
|
||||
do some research to determine whether it has already been
|
||||
discovered and addressed. Try Googling the error message or
|
||||
browsing the <citetitle>nmap-dev</citetitle> archives at <ulink
|
||||
@@ -996,7 +996,7 @@
|
||||
<para>Ncat is (C) 2005–2012 Insecure.Com LLC. It is distributed
|
||||
as free and open source software under the same license terms as our
|
||||
Nmap software. Precise terms and further details are available
|
||||
<man>from <ulink url="http://nmap.org/man/man-legal.html"/>.</man>
|
||||
<man>from <ulink url="https://nmap.org/man/man-legal.html"/>.</man>
|
||||
<notman>in <xref linkend="nmap-copyright"/>.</notman></para>
|
||||
</refsect2>
|
||||
|
||||
|
||||
@@ -467,7 +467,7 @@ Content-Type: text/html; charset=UTF-8
|
||||
<indexterm><primary><option>--ssl</option> (Ncat option)</primary><secondary>example of</secondary></indexterm>
|
||||
<screen>
|
||||
$ <userinput>ncat -v --listen --ssl</userinput>
|
||||
Ncat ( http://nmap.org/ncat )
|
||||
Ncat ( https://nmap.org/ncat )
|
||||
Generating a temporary 1024-bit RSA key. Use --ssl-key and --ssl-cert to use a <continuation/>permanent one.
|
||||
SHA-1 fingerprint: F0:13:BF:FB:2D:AA:76:88:22:60:3E:17:93:29:3E:0E:6B:92:C0:2F
|
||||
</screen>
|
||||
@@ -835,7 +835,7 @@ Protocol mismatch.
|
||||
options. Each of these takes a comma-separated list of host
|
||||
specifications. The syntax is almost identical to that recognized by Nmap for
|
||||
targets
|
||||
(see <ulink url="http://nmap.org/book/man-target-specification.html">the section called <quote>Target Specification</quote></ulink>).
|
||||
(see <ulink url="https://nmap.org/book/man-target-specification.html">the section called <quote>Target Specification</quote></ulink>).
|
||||
<!-- (see <xref linkend="host-discovery-specify-targets"/>). -->
|
||||
This includes IPv4 and IPv6 addresses, hostnames, IPv4 octet ranges,
|
||||
and CIDR netmasks. In Ncat (unlike Nmap), CIDR netmasks are supported for IPv6
|
||||
@@ -1877,7 +1877,7 @@ host1$ <userinput>ncat --send-only host2 < log.txt</userinput>
|
||||
<indexterm><primary><option>--script</option></primary><secondary>example of</secondary></indexterm>
|
||||
<screen>
|
||||
# <userinput>nmap -sSU -p 13 --script=daytime localhost</userinput>
|
||||
Starting Nmap ( http://nmap.org )
|
||||
Starting Nmap ( https://nmap.org )
|
||||
|
||||
Nmap scan report for localhost (127.0.0.1)
|
||||
PORT STATE SERVICE
|
||||
|
||||
Reference in New Issue
Block a user