version 3.95
This commit is contained in:
parent
ffdd6438b3
commit
eb87a6dfe1
@ -1 +1 @@
|
|||||||
nmap-3.93.tar.bz2
|
nmap-3.95.tgz
|
||||||
|
@ -1,65 +1,22 @@
|
|||||||
diff -ur nmap-3.81/docs/nmap.1 nmap-3.81.noms/docs/nmap.1
|
--- nmap-3.95/docs/nmap.usage.txt.noms 2005-12-08 09:20:22.000000000 +0100
|
||||||
--- nmap-3.81/docs/nmap.1 2005-02-07 08:26:08.000000000 +0100
|
+++ nmap-3.95/docs/nmap.usage.txt 2005-12-19 11:44:03.000000000 +0100
|
||||||
+++ nmap-3.81.noms/docs/nmap.1 2005-08-03 14:03:50.000000000 +0200
|
@@ -2,7 +2,7 @@
|
||||||
@@ -131,7 +131,7 @@
|
Usage: nmap [Scan Type(s)] [Options] {target specification}
|
||||||
on a network are up. Nmap can do this by sending ICMP echo
|
TARGET SPECIFICATION:
|
||||||
request packets to every IP address on the networks you
|
Can pass hostnames, IP addresses, networks, etc.
|
||||||
specify. Hosts that respond are up. Unfortunately, some
|
- Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0-255.1-254
|
||||||
-sites such as microsoft.com block echo request packets.
|
+ Ex: scanme.nmap.org, 192.168.0.1; 10.0.0-255.1-254
|
||||||
+sites block echo request packets.
|
-iL <inputfilename>: Input from list of hosts/networks
|
||||||
Thus nmap can also send a TCP ack packet to (by default)
|
-iR <num hosts>: Choose random targets
|
||||||
port 80. If we get an RST back, that machine is up. A
|
--exclude <host1[,host2][,host3],...>: Exclude hosts/networks
|
||||||
third technique involves sending a SYN packet and waiting
|
--- nmap-3.95/docs/nmap.1.noms 2005-12-08 09:20:29.000000000 +0100
|
||||||
@@ -352,12 +352,7 @@
|
+++ nmap-3.95/docs/nmap.1 2005-12-19 11:43:01.000000000 +0100
|
||||||
Do not try to ping hosts at all before scanning them. This
|
@@ -94,7 +94,7 @@
|
||||||
allows the scanning of networks that don't allow ICMP echo
|
Usage: nmap [Scan Type(s)] [Options] {target specification}
|
||||||
requests (or responses) through their firewall.
|
TARGET SPECIFICATION:
|
||||||
-microsoft.com is an example of such a network, and thus you
|
Can pass hostnames, IP addresses, networks, etc.
|
||||||
-should always use
|
- Ex: scanme.nmap.org, microsoft.com/24, 192.168.0.1; 10.0.0\-255.1\-254
|
||||||
-.B \-P0
|
+ Ex: scanme.nmap.org, 192.168.0.1; 10.0.0\-255.1\-254
|
||||||
-or
|
\-iL <inputfilename>: Input from list of hosts/networks
|
||||||
-.B \-PS80
|
\-iR <num hosts>: Choose random targets
|
||||||
-when portscanning microsoft.com. Note that "ping" in this context may
|
\-\-exclude <host1[,host2][,host3],...>: Exclude hosts/networks
|
||||||
+Note that "ping" in this context may
|
|
||||||
involve more than the traditional ICMP echo request packet. Nmap
|
|
||||||
supports many such probes, including arbitrary combinations of TCP,
|
|
||||||
UDP, and ICMP probes. By default, Nmap sends an ICMP echo request and
|
|
||||||
diff -ur nmap-3.81/docs/nmap_doc.html nmap-3.81.noms/docs/nmap_doc.html
|
|
||||||
--- nmap-3.81/docs/nmap_doc.html 2001-03-27 05:07:57.000000000 +0200
|
|
||||||
+++ nmap-3.81.noms/docs/nmap_doc.html 2005-08-03 14:02:18.000000000 +0200
|
|
||||||
@@ -361,7 +361,7 @@
|
|
||||||
things up. You can change the parrallel ping lookahead with '-L' and
|
|
||||||
the ping timeout with '-T'. You can turn pinging off completely with
|
|
||||||
the '-D' command line option. This is useful for scanning networks
|
|
||||||
-like microsoft.com where ICMP echo requests can't get through. Nmap
|
|
||||||
+where ICMP echo requests can't get through. Nmap
|
|
||||||
is also capable of bailing on hosts that seem down based on strange
|
|
||||||
port scanning errors. It is also meant to be tolerant of people who
|
|
||||||
accidentally scan network addresses, broadcast addresses, etc.<BR><BR>
|
|
||||||
diff -ur nmap-3.81/docs/nmap_manpage.html nmap-3.81.noms/docs/nmap_manpage.html
|
|
||||||
--- nmap-3.81/docs/nmap_manpage.html 2005-02-07 09:54:33.000000000 +0100
|
|
||||||
+++ nmap-3.81.noms/docs/nmap_manpage.html 2005-08-03 14:02:49.000000000 +0200
|
|
||||||
@@ -130,8 +130,8 @@
|
|
||||||
<B>-sP</B> Ping scanning: Sometimes you only want to know which hosts on a
|
|
||||||
network are up. Nmap can do this by sending ICMP echo request
|
|
||||||
packets to every IP address on the networks you specify. Hosts
|
|
||||||
- that respond are up. Unfortunately, some sites such as
|
|
||||||
- microsoft.com block echo request packets. Thus nmap can also
|
|
||||||
+ that respond are up. Unfortunately, some sites
|
|
||||||
+ block echo request packets. Thus nmap can also
|
|
||||||
send a TCP ack packet to (by default) port 80. If we get an RST
|
|
||||||
back, that machine is up. A third technique involves sending a
|
|
||||||
SYN packet and waiting for a RST or a SYN/ACK. For non-root
|
|
||||||
diff -ur nmap-3.81/docs/nmap.usage.txt nmap-3.81.noms/docs/nmap.usage.txt
|
|
||||||
--- nmap-3.81/docs/nmap.usage.txt 2005-02-07 09:54:32.000000000 +0100
|
|
||||||
+++ nmap-3.81.noms/docs/nmap.usage.txt 2005-08-03 14:01:38.000000000 +0200
|
|
||||||
@@ -12,7 +12,7 @@
|
|
||||||
-p <range> ports to scan. Example range: 1-1024,1080,6666,31337
|
|
||||||
-F Only scans ports listed in nmap-services
|
|
||||||
-v Verbose. Its use is recommended. Use twice for greater effect.
|
|
||||||
- -P0 Don't ping hosts (needed to scan www.microsoft.com and others)
|
|
||||||
+ -P0 Don't ping hosts
|
|
||||||
* -Ddecoy_host1,decoy2[,...] Hide scan using many decoys
|
|
||||||
-6 scans via IPv6 rather than IPv4
|
|
||||||
-T <Paranoid|Sneaky|Polite|Normal|Aggressive|Insane> General timing policy
|
|
||||||
|
|
||||||
|
18
nmap.spec
18
nmap.spec
@ -1,18 +1,15 @@
|
|||||||
%{!?withgtk1:%define withgtk1 0}
|
|
||||||
|
|
||||||
Summary: Network exploration tool and security scanner
|
Summary: Network exploration tool and security scanner
|
||||||
Name: nmap
|
Name: nmap
|
||||||
Version: 3.93
|
Version: 3.95
|
||||||
Release: 3.1
|
Release: 1
|
||||||
License: GPL
|
License: GPL
|
||||||
Group: Applications/System
|
Group: Applications/System
|
||||||
Source0: http://download.insecure.org/nmap/dist/%{name}-%{version}.tar.bz2
|
Source0: http://download.insecure.org/nmap/dist/%{name}-%{version}.tgz
|
||||||
Source1: nmapfe.desktop
|
Source1: nmapfe.desktop
|
||||||
Source2: nmapfe-32.png
|
Source2: nmapfe-32.png
|
||||||
Source3: nmapfe-48.png
|
Source3: nmapfe-48.png
|
||||||
Patch0: inet_aton.patch
|
Patch0: inet_aton.patch
|
||||||
Patch1: makefile.patch
|
Patch1: makefile.patch
|
||||||
Patch2: nmap-3.78-gtk2.patch
|
|
||||||
Patch3: nmap-3.81-noms.patch
|
Patch3: nmap-3.81-noms.patch
|
||||||
Patch4: nmap-3.93-attr.patch
|
Patch4: nmap-3.93-attr.patch
|
||||||
URL: http://www.insecure.org/nmap/
|
URL: http://www.insecure.org/nmap/
|
||||||
@ -39,9 +36,6 @@ be installed before installing nmap-frontend.
|
|||||||
|
|
||||||
%prep
|
%prep
|
||||||
%setup -q
|
%setup -q
|
||||||
%if ! %{withgtk1}
|
|
||||||
%patch2 -p1 -b .gtk2
|
|
||||||
%endif
|
|
||||||
%patch3 -p1 -b .noms
|
%patch3 -p1 -b .noms
|
||||||
%patch4 -p1 -b .attr
|
%patch4 -p1 -b .attr
|
||||||
|
|
||||||
@ -75,8 +69,7 @@ rm -rf $RPM_BUILD_ROOT
|
|||||||
%defattr(-,root,root)
|
%defattr(-,root,root)
|
||||||
%doc COPYING*
|
%doc COPYING*
|
||||||
%doc docs/README docs/nmap-fingerprinting-article.txt
|
%doc docs/README docs/nmap-fingerprinting-article.txt
|
||||||
%doc docs/nmap.deprecated.txt docs/nmap.usage.txt docs/nmap_doc.html
|
%doc docs/nmap.deprecated.txt docs/nmap.usage.txt
|
||||||
%doc docs/nmap_manpage.html
|
|
||||||
%{_bindir}/nmap
|
%{_bindir}/nmap
|
||||||
%{_datadir}/nmap
|
%{_datadir}/nmap
|
||||||
%{_mandir}/man1/nmap.1.gz
|
%{_mandir}/man1/nmap.1.gz
|
||||||
@ -91,6 +84,9 @@ rm -rf $RPM_BUILD_ROOT
|
|||||||
%{_mandir}/man1/xnmap.1.gz
|
%{_mandir}/man1/xnmap.1.gz
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon Dec 19 2005 Harald Hoyer <harald@redhat.com> - 2:3.95-1
|
||||||
|
- version 3.95
|
||||||
|
|
||||||
* Fri Dec 09 2005 Jesse Keating <jkeating@redhat.com>
|
* Fri Dec 09 2005 Jesse Keating <jkeating@redhat.com>
|
||||||
- rebuilt
|
- rebuilt
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user