summaryrefslogtreecommitdiffstats
path: root/security/nmap
Commit message (Collapse)AuthorAgeFilesLines
* Upgrade to 2.3BETA6.obrien1999-09-202-3/+3
| | | | | | | | | | | | | | * Added sophisticated timing controls to give the user much more control over Nmap's speed. This allows you to make Nmap much more aggressive to scan hosts faster, or you can make Nmap more "polite" -- slower but less likely to wreak havoc on your Network. You can even enforce large delays between sending packets to sneak under IDS thresholds and prevent detection. See the new "Timing Options" section of the Nmap man page for more information on using this. * New "Window scan" that does fun things with ACK packets. -sW activates this scan type. It is mostly effective against BSD, AIX, Digital UNIX, and various older HP/UX, SunOS, and VAX.
* Remove the X dependent componate. It has become its own port.obrien1999-09-182-6/+0
|
* Upgrade to 2.3BETA5.obrien1999-09-072-3/+3
| | | | | This includes new RPC scanning ability & 100's of new OS fingerprints. The machine parseable output has been cleaned up and made more regular.
* $Id$ -> $FreeBSD$peter1999-08-313-3/+3
|
* Hard code the path to nmap w/in nmapfe. Thus it will work in the face of aobrien1999-07-232-0/+46
| | | | | | limited path. Bug reported by: Andre Albsmeier <andre.albsmeier@mchp.siemens.de>
* Upgrade to nmap-2.2-BETA4. The beta includes a very nice GUI (xnmap) thatobrien1999-07-224-9/+16
| | | | simplifies the running of nmap for the point and shoot crowd.
* #4/4 enforcing Caps, no periodhoek1999-06-261-1/+1
| | | | | | | | | | | | [Has anyone figured-out what makes the number 393 so interesting to PW, now?] I wonder what was going through Jordan's head during his infamous $Id$-smashing commit. Before I forget.... Thanks to naddy@mips.rhein-neckar.de (Christian Weisgerber) for prompting this commit. See msg-id: 7geokh$tje$1@mips.rhein-neckar.de
* Add WWW: to DESCR filesmharo1999-05-031-3/+4
|
* Don't set OSVERSION; bsd.port.pre.mk already did.fenner1999-04-071-2/+1
| | | | Found by: building ports with sysctl not in my path
* Upgrade to 2.12.obrien1999-04-042-3/+3
|
* Upgrade to 2.11.obrien1999-04-032-3/+3
|
* upgrade to 2.08obrien1999-02-172-3/+4
|
* Correct Version required: lineflathill1999-02-111-3/+2
|
* Update to 2.07flathill1999-02-112-4/+4
|
* upgrade to 2.06obrien1999-02-082-3/+3
|
* upgrade to 2.05obrien1999-02-084-9/+19
|
* upgrade to 2.03obrien1999-01-282-3/+3
|
* upgrade to 2.02obrien1998-12-292-3/+3
|
* Need to include bsd.port.pre.mk before using ${OSVERSION}.asami1998-12-261-2/+4
|
* upgrade to 2.01obrien1998-12-172-3/+3
| | | | [many new OS fingerprints included :-) ]
* Somehow this delete didn't propagate.obrien1998-12-171-20/+0
|
* Upgrade to 2.00.obrien1998-12-155-13/+28
|
* Fix the bug when the user specs the source address as the tun0/ppp0asami1998-11-291-0/+20
| | | | | | link. Submitted by: jmb
* * Nuke included libpcap so I don't make the mistake ache fixed again.obrien1998-08-202-20/+15
| | | | * Prefer -u diffs over -c
* Old version use bpf.h from internal libpcap and link withache1998-08-183-2/+21
| | | | | | system libpcap in the same time. Fix to use <net/bpf.h> instead New manpages scheme
* Added "net" to categoriesobrien1998-08-041-2/+2
|
* nmap is a utility for port scanning large networksobrien1998-08-046-0/+126
Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do all this with one scanning mode. Thus nmap incorporats virtually every scanning technique known of. See the nmap homepage at http://www.insecure.org/nmap/index.html
OpenPOWER on IntegriCloud