version 3.95

This commit is contained in:
Harald Hoyer 2005-12-19 10:52:00 +00:00
parent ffdd6438b3
commit eb87a6dfe1
4 changed files with 31 additions and 78 deletions

View File

@ -1 +1 @@
nmap-3.93.tar.bz2
nmap-3.95.tgz

View File

@ -1,65 +1,22 @@
diff -ur nmap-3.81/docs/nmap.1 nmap-3.81.noms/docs/nmap.1
--- nmap-3.81/docs/nmap.1 2005-02-07 08:26:08.000000000 +0100
+++ nmap-3.81.noms/docs/nmap.1 2005-08-03 14:03:50.000000000 +0200
@@ -131,7 +131,7 @@
on a network are up. Nmap can do this by sending ICMP echo
request packets to every IP address on the networks you
specify. Hosts that respond are up. Unfortunately, some
-sites such as microsoft.com block echo request packets.
+sites block echo request packets.
Thus nmap can also send a TCP ack packet to (by default)
port 80. If we get an RST back, that machine is up. A
third technique involves sending a SYN packet and waiting
@@ -352,12 +352,7 @@
Do not try to ping hosts at all before scanning them. This
allows the scanning of networks that don't allow ICMP echo
requests (or responses) through their firewall.
-microsoft.com is an example of such a network, and thus you
-should always use
-.B \-P0
-or
-.B \-PS80
-when portscanning microsoft.com. Note that "ping" in this context may
+Note that "ping" in this context may
involve more than the traditional ICMP echo request packet. Nmap
supports many such probes, including arbitrary combinations of TCP,
UDP, and ICMP probes. By default, Nmap sends an ICMP echo request and
diff -ur nmap-3.81/docs/nmap_doc.html nmap-3.81.noms/docs/nmap_doc.html
--- nmap-3.81/docs/nmap_doc.html 2001-03-27 05:07:57.000000000 +0200
+++ nmap-3.81.noms/docs/nmap_doc.html 2005-08-03 14:02:18.000000000 +0200
@@ -361,7 +361,7 @@
things up. You can change the parrallel ping lookahead with '-L' and
the ping timeout with '-T'. You can turn pinging off completely with
the '-D' command line option. This is useful for scanning networks
-like microsoft.com where ICMP echo requests can't get through. Nmap
+where ICMP echo requests can't get through. Nmap
is also capable of bailing on hosts that seem down based on strange
port scanning errors. It is also meant to be tolerant of people who
accidentally scan network addresses, broadcast addresses, etc.<BR><BR>
diff -ur nmap-3.81/docs/nmap_manpage.html nmap-3.81.noms/docs/nmap_manpage.html
--- nmap-3.81/docs/nmap_manpage.html 2005-02-07 09:54:33.000000000 +0100
+++ nmap-3.81.noms/docs/nmap_manpage.html 2005-08-03 14:02:49.000000000 +0200
@@ -130,8 +130,8 @@
<B>-sP</B> Ping scanning: Sometimes you only want to know which hosts on a
network are up. Nmap can do this by sending ICMP echo request
packets to every IP address on the networks you specify. Hosts
- that respond are up. Unfortunately, some sites such as
- microsoft.com block echo request packets. Thus nmap can also
+ that respond are up. Unfortunately, some sites
+ block echo request packets. Thus nmap can also
send a TCP ack packet to (by default) port 80. If we get an RST
back, that machine is up. A third technique involves sending a
SYN packet and waiting for a RST or a SYN/ACK. For non-root
diff -ur nmap-3.81/docs/nmap.usage.txt nmap-3.81.noms/docs/nmap.usage.txt
--- nmap-3.81/docs/nmap.usage.txt 2005-02-07 09:54:32.000000000 +0100
+++ nmap-3.81.noms/docs/nmap.usage.txt 2005-08-03 14:01:38.000000000 +0200
@@ -12,7 +12,7 @@
-p <range> ports to scan. Example range: 1-1024,1080,6666,31337
-F Only scans ports listed in nmap-services
-v Verbose. Its use is recommended. Use twice for greater effect.
- -P0 Don't ping hosts (needed to scan www.microsoft.com and others)
+ -P0 Don't ping hosts
* -Ddecoy_host1,decoy2[,...] Hide scan using many decoys
-6 scans via IPv6 rather than IPv4
-T <Paranoid|Sneaky|Polite|Normal|Aggressive|Insane> General timing policy
--- nmap-3.95/docs/nmap.usage.txt.noms 2005-12-08 09:20:22.000000000 +0100
+++ nmap-3.95/docs/nmap.usage.txt 2005-12-19 11:44:03.000000000 +0100
@@ -2,7 +2,7 @@
Usage: nmap [Scan Type(s)] [Options] {target specification}
TARGET SPECIFICATION:
Can pass hostnames, IP addresses, networks, etc.
- Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254
+ Ex: scanme.nmap.org, 192.168.0.1; 10.0.0-255.1-254
-iL <inputfilename>: Input from list of hosts/networks
-iR <num hosts>: Choose random targets
--exclude <host1[,host2][,host3],...>: Exclude hosts/networks
--- nmap-3.95/docs/nmap.1.noms 2005-12-08 09:20:29.000000000 +0100
+++ nmap-3.95/docs/nmap.1 2005-12-19 11:43:01.000000000 +0100
@@ -94,7 +94,7 @@
Usage: nmap [Scan Type(s)] [Options] {target specification}
TARGET SPECIFICATION:
Can pass hostnames, IP addresses, networks, etc.
- Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0\-255.1\-254
+ Ex: scanme.nmap.org, 192.168.0.1; 10.0.0\-255.1\-254
\-iL <inputfilename>: Input from list of hosts/networks
\-iR <num hosts>: Choose random targets
\-\-exclude <host1[,host2][,host3],...>: Exclude hosts/networks

View File

@ -1,18 +1,15 @@
%{!?withgtk1:%define withgtk1 0}
Summary: Network exploration tool and security scanner
Name: nmap
Version: 3.93
Release: 3.1
Version: 3.95
Release: 1
License: GPL
Group: Applications/System
Source0: http://download.insecure.org/nmap/dist/%{name}-%{version}.tar.bz2
Source0: http://download.insecure.org/nmap/dist/%{name}-%{version}.tgz
Source1: nmapfe.desktop
Source2: nmapfe-32.png
Source3: nmapfe-48.png
Patch0: inet_aton.patch
Patch1: makefile.patch
Patch2: nmap-3.78-gtk2.patch
Patch3: nmap-3.81-noms.patch
Patch4: nmap-3.93-attr.patch
URL: http://www.insecure.org/nmap/
@ -39,9 +36,6 @@ be installed before installing nmap-frontend.
%prep
%setup -q
%if ! %{withgtk1}
%patch2 -p1 -b .gtk2
%endif
%patch3 -p1 -b .noms
%patch4 -p1 -b .attr
@ -75,8 +69,7 @@ rm -rf $RPM_BUILD_ROOT
%defattr(-,root,root)
%doc COPYING*
%doc docs/README docs/nmap-fingerprinting-article.txt
%doc docs/nmap.deprecated.txt docs/nmap.usage.txt docs/nmap_doc.html
%doc docs/nmap_manpage.html
%doc docs/nmap.deprecated.txt docs/nmap.usage.txt
%{_bindir}/nmap
%{_datadir}/nmap
%{_mandir}/man1/nmap.1.gz
@ -91,6 +84,9 @@ rm -rf $RPM_BUILD_ROOT
%{_mandir}/man1/xnmap.1.gz
%changelog
* Mon Dec 19 2005 Harald Hoyer <harald@redhat.com> - 2:3.95-1
- version 3.95
* Fri Dec 09 2005 Jesse Keating <jkeating@redhat.com>
- rebuilt

View File

@ -1 +1 @@
92e69a2e8db0eb59b5d71b8b363892f2 nmap-3.93.tar.bz2
8aab9467378cb71ed767a863ecde58c4 nmap-3.95.tgz