ebaa0d86ff
* Added ACK scanning. This scan technique is great for testing firewall rulesets. It can NOT find open ports, but it can distinguish between filtered/unfilterd by sending an ACK packet to each port and waiting for a RST to come back. Filtered ports will not send back a RST (or will send ICMP unreachables). This scan type is activated with -sA . * Documented the Window scan (-sW) * "Protocol" field in output eliminated. It is now printed right next to the number (/etc/services style). Like "22/tcp". * Added --resume option to continue a large network scan where you left off. It also allows you to start and stop for policy reasons |
||
---|---|---|
.. | ||
nmap.1 | ||
patch-aa | ||
patch-ab | ||
patch-ac | ||
patch-ad |