mirror of
https://github.com/nmap/nmap.git
synced 2026-02-09 06:56:35 +00:00
18faddcc96395b8b09fd19422ac1f4251c1c882c
Since r24413, we have tried "connecting" a UDP socket and using getsockname in order to infer our source address. This replaced previous behavior of always using the interface address. However, this appears to fail when scnning certain *.0 addresses on Windows XP. So fall back to the old behavior. http://seclists.org/nmap-dev/2012/q2/464
Here is some documentation for Nmap, but these files are much less comprehensive than what you'll find at the actual Nmap documentation site ( http://nmap.org ).
Description
Languages
C
37.5%
Lua
28.1%
C++
16.8%
Shell
5.8%
Python
4.2%
Other
7.3%