Nmap 2.02 port scanner.

This commit is contained in:
angelos 1999-01-11 05:37:23 +00:00
parent 54935fbb9b
commit f472f87226
5 changed files with 57 additions and 0 deletions

20
net/nmap/Makefile Normal file
View File

@ -0,0 +1,20 @@
# OpenBSD makefile for: nmap
# Version required: 2.02
# Date created: 10 January 1999
# Whom: Angelos D. Keromytis
#
# $OpenBSD: Makefile,v 1.1.1.1 1999/01/11 05:37:23 angelos Exp $
#
DISTNAME= nmap-2.02
PKGNAME= nmap-2.02
CATEGORIES= net
MAINTAINER= angelos@openbsd.org
MASTER_SITES= http://www.insecure.org/nmap/
EXTRACT_SUFX= .tgz
HAS_CONFIGURE= yes
.include <bsd.port.mk>

1
net/nmap/files/md5 Normal file
View File

@ -0,0 +1 @@
MD5 (nmap-2.02.tgz) = 9e0d43a015b13a529dc3050d4732ac76

1
net/nmap/pkg/COMMENT Normal file
View File

@ -0,0 +1 @@
Nmap is a utility for port scanning large networks.

32
net/nmap/pkg/DESCR Normal file
View File

@ -0,0 +1,32 @@
Nmap is a utility for port scanning large networks, although it works
fine for single hosts. The guiding philosophy for the creation of nmap
was TMTOWTDI (There's More Than One Way To Do It). This is the Perl
slogan, but it is equally applicable to scanners. Sometimes you need
speed, other times you may need stealth. In some cases, bypassing
firewalls may be required. Not to mention the fact that you may want
to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do
all this with one scanning mode. And you don't want to have 10
different scanners around, all with different interfaces and
capabilities. Thus I incorporated virtually every scanning technique I
know into nmap. Specifically, nmap supports:
Vanilla TCP connect() scanning,
TCP SYN (half open) scanning,
TCP FIN, Xmas, or NULL (stealth) scanning,
TCP ftp proxy (bounce attack) scanning,
SYN/FIN scanning using IP fragments (bypasses packet filters),
UDP raw ICMP port unreachable scanning,
ICMP scanning (ping-sweep),
TCP Ping scanning,
Remote OS Identification by TCP/IP Fingerprinting, and
Reverse-ident scanning.
nmap also supports a number of performance and reliability features
such as dynamic delay time calculations, packet timeout and
retransmission, parallel port scanning, detection of down hosts via
parallel pings. Nmap also offers flexible target and port
specification, decoy scanning, determination of TCP sequence
predictability characteristics, and output to machine parseable or
human readable log files.
For more details, see http://www.insecure.org/nmap/

3
net/nmap/pkg/PLIST Normal file
View File

@ -0,0 +1,3 @@
bin/nmap
man/man1/nmap.1
lib/nmap-os-fingerprints