nmap/nmap-3.81-noms.patch

66 lines
3.7 KiB
Diff
Raw Normal View History

diff -ur nmap-3.81/docs/nmap.1 nmap-3.81.noms/docs/nmap.1
--- nmap-3.81/docs/nmap.1 2005-02-07 08:26:08.000000000 +0100
+++ nmap-3.81.noms/docs/nmap.1 2005-08-03 14:03:50.000000000 +0200
@@ -131,7 +131,7 @@
on a network are up. Nmap can do this by sending ICMP echo
request packets to every IP address on the networks you
specify. Hosts that respond are up. Unfortunately, some
-sites such as microsoft.com block echo request packets.
+sites block echo request packets.
Thus nmap can also send a TCP ack packet to (by default)
port 80. If we get an RST back, that machine is up. A
third technique involves sending a SYN packet and waiting
@@ -352,12 +352,7 @@
Do not try to ping hosts at all before scanning them. This
allows the scanning of networks that don't allow ICMP echo
requests (or responses) through their firewall.
-microsoft.com is an example of such a network, and thus you
-should always use
-.B \-P0
-or
-.B \-PS80
-when portscanning microsoft.com. Note that "ping" in this context may
+Note that "ping" in this context may
involve more than the traditional ICMP echo request packet. Nmap
supports many such probes, including arbitrary combinations of TCP,
UDP, and ICMP probes. By default, Nmap sends an ICMP echo request and
diff -ur nmap-3.81/docs/nmap_doc.html nmap-3.81.noms/docs/nmap_doc.html
--- nmap-3.81/docs/nmap_doc.html 2001-03-27 05:07:57.000000000 +0200
+++ nmap-3.81.noms/docs/nmap_doc.html 2005-08-03 14:02:18.000000000 +0200
@@ -361,7 +361,7 @@
things up. You can change the parrallel ping lookahead with '-L' and
the ping timeout with '-T'. You can turn pinging off completely with
the '-D' command line option. This is useful for scanning networks
-like microsoft.com where ICMP echo requests can't get through. Nmap
+where ICMP echo requests can't get through. Nmap
is also capable of bailing on hosts that seem down based on strange
port scanning errors. It is also meant to be tolerant of people who
accidentally scan network addresses, broadcast addresses, etc.<BR><BR>
diff -ur nmap-3.81/docs/nmap_manpage.html nmap-3.81.noms/docs/nmap_manpage.html
--- nmap-3.81/docs/nmap_manpage.html 2005-02-07 09:54:33.000000000 +0100
+++ nmap-3.81.noms/docs/nmap_manpage.html 2005-08-03 14:02:49.000000000 +0200
@@ -130,8 +130,8 @@
<B>-sP</B> Ping scanning: Sometimes you only want to know which hosts on a
network are up. Nmap can do this by sending ICMP echo request
packets to every IP address on the networks you specify. Hosts
- that respond are up. Unfortunately, some sites such as
- microsoft.com block echo request packets. Thus nmap can also
+ that respond are up. Unfortunately, some sites
+ block echo request packets. Thus nmap can also
send a TCP ack packet to (by default) port 80. If we get an RST
back, that machine is up. A third technique involves sending a
SYN packet and waiting for a RST or a SYN/ACK. For non-root
diff -ur nmap-3.81/docs/nmap.usage.txt nmap-3.81.noms/docs/nmap.usage.txt
--- nmap-3.81/docs/nmap.usage.txt 2005-02-07 09:54:32.000000000 +0100
+++ nmap-3.81.noms/docs/nmap.usage.txt 2005-08-03 14:01:38.000000000 +0200
@@ -12,7 +12,7 @@
-p <range> ports to scan. Example range: 1-1024,1080,6666,31337
-F Only scans ports listed in nmap-services
-v Verbose. Its use is recommended. Use twice for greater effect.
- -P0 Don't ping hosts (needed to scan www.microsoft.com and others)
+ -P0 Don't ping hosts
* -Ddecoy_host1,decoy2[,...] Hide scan using many decoys
-6 scans via IPv6 rather than IPv4
-T <Paranoid|Sneaky|Polite|Normal|Aggressive|Insane> General timing policy