Nmap 2.02 port scanner.
This commit is contained in:
parent
54935fbb9b
commit
f472f87226
20
net/nmap/Makefile
Normal file
20
net/nmap/Makefile
Normal file
@ -0,0 +1,20 @@
|
||||
# OpenBSD makefile for: nmap
|
||||
# Version required: 2.02
|
||||
# Date created: 10 January 1999
|
||||
# Whom: Angelos D. Keromytis
|
||||
#
|
||||
# $OpenBSD: Makefile,v 1.1.1.1 1999/01/11 05:37:23 angelos Exp $
|
||||
#
|
||||
|
||||
DISTNAME= nmap-2.02
|
||||
PKGNAME= nmap-2.02
|
||||
CATEGORIES= net
|
||||
|
||||
MAINTAINER= angelos@openbsd.org
|
||||
|
||||
MASTER_SITES= http://www.insecure.org/nmap/
|
||||
EXTRACT_SUFX= .tgz
|
||||
|
||||
HAS_CONFIGURE= yes
|
||||
|
||||
.include <bsd.port.mk>
|
1
net/nmap/files/md5
Normal file
1
net/nmap/files/md5
Normal file
@ -0,0 +1 @@
|
||||
MD5 (nmap-2.02.tgz) = 9e0d43a015b13a529dc3050d4732ac76
|
1
net/nmap/pkg/COMMENT
Normal file
1
net/nmap/pkg/COMMENT
Normal file
@ -0,0 +1 @@
|
||||
Nmap is a utility for port scanning large networks.
|
32
net/nmap/pkg/DESCR
Normal file
32
net/nmap/pkg/DESCR
Normal file
@ -0,0 +1,32 @@
|
||||
Nmap is a utility for port scanning large networks, although it works
|
||||
fine for single hosts. The guiding philosophy for the creation of nmap
|
||||
was TMTOWTDI (There's More Than One Way To Do It). This is the Perl
|
||||
slogan, but it is equally applicable to scanners. Sometimes you need
|
||||
speed, other times you may need stealth. In some cases, bypassing
|
||||
firewalls may be required. Not to mention the fact that you may want
|
||||
to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do
|
||||
all this with one scanning mode. And you don't want to have 10
|
||||
different scanners around, all with different interfaces and
|
||||
capabilities. Thus I incorporated virtually every scanning technique I
|
||||
know into nmap. Specifically, nmap supports:
|
||||
|
||||
Vanilla TCP connect() scanning,
|
||||
TCP SYN (half open) scanning,
|
||||
TCP FIN, Xmas, or NULL (stealth) scanning,
|
||||
TCP ftp proxy (bounce attack) scanning,
|
||||
SYN/FIN scanning using IP fragments (bypasses packet filters),
|
||||
UDP raw ICMP port unreachable scanning,
|
||||
ICMP scanning (ping-sweep),
|
||||
TCP Ping scanning,
|
||||
Remote OS Identification by TCP/IP Fingerprinting, and
|
||||
Reverse-ident scanning.
|
||||
|
||||
nmap also supports a number of performance and reliability features
|
||||
such as dynamic delay time calculations, packet timeout and
|
||||
retransmission, parallel port scanning, detection of down hosts via
|
||||
parallel pings. Nmap also offers flexible target and port
|
||||
specification, decoy scanning, determination of TCP sequence
|
||||
predictability characteristics, and output to machine parseable or
|
||||
human readable log files.
|
||||
|
||||
For more details, see http://www.insecure.org/nmap/
|
3
net/nmap/pkg/PLIST
Normal file
3
net/nmap/pkg/PLIST
Normal file
@ -0,0 +1,3 @@
|
||||
bin/nmap
|
||||
man/man1/nmap.1
|
||||
lib/nmap-os-fingerprints
|
Loading…
Reference in New Issue
Block a user