version 3.95

This commit is contained in:
Harald Hoyer 2005-12-19 10:52:00 +00:00
parent ffdd6438b3
commit eb87a6dfe1
4 changed files with 31 additions and 78 deletions

View File

@ -1 +1 @@
nmap-3.93.tar.bz2 nmap-3.95.tgz

View File

@ -1,65 +1,22 @@
diff -ur nmap-3.81/docs/nmap.1 nmap-3.81.noms/docs/nmap.1 --- nmap-3.95/docs/nmap.usage.txt.noms 2005-12-08 09:20:22.000000000 +0100
--- nmap-3.81/docs/nmap.1 2005-02-07 08:26:08.000000000 +0100 +++ nmap-3.95/docs/nmap.usage.txt 2005-12-19 11:44:03.000000000 +0100
+++ nmap-3.81.noms/docs/nmap.1 2005-08-03 14:03:50.000000000 +0200 @@ -2,7 +2,7 @@
@@ -131,7 +131,7 @@ Usage: nmap [Scan Type(s)] [Options] {target specification}
on a network are up. Nmap can do this by sending ICMP echo TARGET SPECIFICATION:
request packets to every IP address on the networks you Can pass hostnames, IP addresses, networks, etc.
specify. Hosts that respond are up. Unfortunately, some - Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254
-sites such as microsoft.com block echo request packets. + Ex: scanme.nmap.org, 192.168.0.1; 10.0.0-255.1-254
+sites block echo request packets. -iL <inputfilename>: Input from list of hosts/networks
Thus nmap can also send a TCP ack packet to (by default) -iR <num hosts>: Choose random targets
port 80. If we get an RST back, that machine is up. A --exclude <host1[,host2][,host3],...>: Exclude hosts/networks
third technique involves sending a SYN packet and waiting --- nmap-3.95/docs/nmap.1.noms 2005-12-08 09:20:29.000000000 +0100
@@ -352,12 +352,7 @@ +++ nmap-3.95/docs/nmap.1 2005-12-19 11:43:01.000000000 +0100
Do not try to ping hosts at all before scanning them. This @@ -94,7 +94,7 @@
allows the scanning of networks that don't allow ICMP echo Usage: nmap [Scan Type(s)] [Options] {target specification}
requests (or responses) through their firewall. TARGET SPECIFICATION:
-microsoft.com is an example of such a network, and thus you Can pass hostnames, IP addresses, networks, etc.
-should always use - Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0\-255.1\-254
-.B \-P0 + Ex: scanme.nmap.org, 192.168.0.1; 10.0.0\-255.1\-254
-or \-iL <inputfilename>: Input from list of hosts/networks
-.B \-PS80 \-iR <num hosts>: Choose random targets
-when portscanning microsoft.com. Note that "ping" in this context may \-\-exclude <host1[,host2][,host3],...>: Exclude hosts/networks
+Note that "ping" in this context may
involve more than the traditional ICMP echo request packet. Nmap
supports many such probes, including arbitrary combinations of TCP,
UDP, and ICMP probes. By default, Nmap sends an ICMP echo request and
diff -ur nmap-3.81/docs/nmap_doc.html nmap-3.81.noms/docs/nmap_doc.html
--- nmap-3.81/docs/nmap_doc.html 2001-03-27 05:07:57.000000000 +0200
+++ nmap-3.81.noms/docs/nmap_doc.html 2005-08-03 14:02:18.000000000 +0200
@@ -361,7 +361,7 @@
things up. You can change the parrallel ping lookahead with '-L' and
the ping timeout with '-T'. You can turn pinging off completely with
the '-D' command line option. This is useful for scanning networks
-like microsoft.com where ICMP echo requests can't get through. Nmap
+where ICMP echo requests can't get through. Nmap
is also capable of bailing on hosts that seem down based on strange
port scanning errors. It is also meant to be tolerant of people who
accidentally scan network addresses, broadcast addresses, etc.<BR><BR>
diff -ur nmap-3.81/docs/nmap_manpage.html nmap-3.81.noms/docs/nmap_manpage.html
--- nmap-3.81/docs/nmap_manpage.html 2005-02-07 09:54:33.000000000 +0100
+++ nmap-3.81.noms/docs/nmap_manpage.html 2005-08-03 14:02:49.000000000 +0200
@@ -130,8 +130,8 @@
<B>-sP</B> Ping scanning: Sometimes you only want to know which hosts on a
network are up. Nmap can do this by sending ICMP echo request
packets to every IP address on the networks you specify. Hosts
- that respond are up. Unfortunately, some sites such as
- microsoft.com block echo request packets. Thus nmap can also
+ that respond are up. Unfortunately, some sites
+ block echo request packets. Thus nmap can also
send a TCP ack packet to (by default) port 80. If we get an RST
back, that machine is up. A third technique involves sending a
SYN packet and waiting for a RST or a SYN/ACK. For non-root
diff -ur nmap-3.81/docs/nmap.usage.txt nmap-3.81.noms/docs/nmap.usage.txt
--- nmap-3.81/docs/nmap.usage.txt 2005-02-07 09:54:32.000000000 +0100
+++ nmap-3.81.noms/docs/nmap.usage.txt 2005-08-03 14:01:38.000000000 +0200
@@ -12,7 +12,7 @@
-p <range> ports to scan. Example range: 1-1024,1080,6666,31337
-F Only scans ports listed in nmap-services
-v Verbose. Its use is recommended. Use twice for greater effect.
- -P0 Don't ping hosts (needed to scan www.microsoft.com and others)
+ -P0 Don't ping hosts
* -Ddecoy_host1,decoy2[,...] Hide scan using many decoys
-6 scans via IPv6 rather than IPv4
-T <Paranoid|Sneaky|Polite|Normal|Aggressive|Insane> General timing policy

View File

@ -1,18 +1,15 @@
%{!?withgtk1:%define withgtk1 0}
Summary: Network exploration tool and security scanner Summary: Network exploration tool and security scanner
Name: nmap Name: nmap
Version: 3.93 Version: 3.95
Release: 3.1 Release: 1
License: GPL License: GPL
Group: Applications/System Group: Applications/System
Source0: http://download.insecure.org/nmap/dist/%{name}-%{version}.tar.bz2 Source0: http://download.insecure.org/nmap/dist/%{name}-%{version}.tgz
Source1: nmapfe.desktop Source1: nmapfe.desktop
Source2: nmapfe-32.png Source2: nmapfe-32.png
Source3: nmapfe-48.png Source3: nmapfe-48.png
Patch0: inet_aton.patch Patch0: inet_aton.patch
Patch1: makefile.patch Patch1: makefile.patch
Patch2: nmap-3.78-gtk2.patch
Patch3: nmap-3.81-noms.patch Patch3: nmap-3.81-noms.patch
Patch4: nmap-3.93-attr.patch Patch4: nmap-3.93-attr.patch
URL: http://www.insecure.org/nmap/ URL: http://www.insecure.org/nmap/
@ -39,9 +36,6 @@ be installed before installing nmap-frontend.
%prep %prep
%setup -q %setup -q
%if ! %{withgtk1}
%patch2 -p1 -b .gtk2
%endif
%patch3 -p1 -b .noms %patch3 -p1 -b .noms
%patch4 -p1 -b .attr %patch4 -p1 -b .attr
@ -75,8 +69,7 @@ rm -rf $RPM_BUILD_ROOT
%defattr(-,root,root) %defattr(-,root,root)
%doc COPYING* %doc COPYING*
%doc docs/README docs/nmap-fingerprinting-article.txt %doc docs/README docs/nmap-fingerprinting-article.txt
%doc docs/nmap.deprecated.txt docs/nmap.usage.txt docs/nmap_doc.html %doc docs/nmap.deprecated.txt docs/nmap.usage.txt
%doc docs/nmap_manpage.html
%{_bindir}/nmap %{_bindir}/nmap
%{_datadir}/nmap %{_datadir}/nmap
%{_mandir}/man1/nmap.1.gz %{_mandir}/man1/nmap.1.gz
@ -91,6 +84,9 @@ rm -rf $RPM_BUILD_ROOT
%{_mandir}/man1/xnmap.1.gz %{_mandir}/man1/xnmap.1.gz
%changelog %changelog
* Mon Dec 19 2005 Harald Hoyer <harald@redhat.com> - 2:3.95-1
- version 3.95
* Fri Dec 09 2005 Jesse Keating <jkeating@redhat.com> * Fri Dec 09 2005 Jesse Keating <jkeating@redhat.com>
- rebuilt - rebuilt

View File

@ -1 +1 @@
92e69a2e8db0eb59b5d71b8b363892f2 nmap-3.93.tar.bz2 8aab9467378cb71ed767a863ecde58c4 nmap-3.95.tgz