mirror of
https://github.com/nmap/nmap.git
synced 2026-05-13 16:57:06 +00:00
Fix a word-wrapping issue
This commit is contained in:
parent
ca58ae9562
commit
d6877eb7b7
2 changed files with 2 additions and 4 deletions
|
|
@ -353,9 +353,7 @@ This host discovery is often sufficient when scanning local networks, but a more
|
|||
.PP
|
||||
The
|
||||
\fB\-P*\fR
|
||||
options (which select ping types) can be combined\&. You can increase your odds of penetrating strict firewalls by sending many probe types using different TCP ports/flags and ICMP codes\&. Also note that ARP/Neighbor Discovery
|
||||
|
||||
is done by default against targets on a local Ethernet network even if you specify other
|
||||
options (which select ping types) can be combined\&. You can increase your odds of penetrating strict firewalls by sending many probe types using different TCP ports/flags and ICMP codes\&. Also note that ARP/Neighbor Discovery is done by default against targets on a local Ethernet network even if you specify other
|
||||
\fB\-P*\fR
|
||||
options, because it is almost always faster and more effective\&.
|
||||
.PP
|
||||
|
|
|
|||
|
|
@ -388,7 +388,7 @@ you would expect.</para>
|
|||
ping types) can be combined. You can increase your odds of
|
||||
penetrating strict firewalls by sending many probe types using
|
||||
different TCP ports/flags and ICMP codes. Also note that
|
||||
ARP/Neighbor Discovery <indexterm><primary>ARP ping</primary></indexterm>
|
||||
ARP/Neighbor Discovery<indexterm><primary>ARP ping</primary></indexterm>
|
||||
is done by default against
|
||||
targets on a local Ethernet network even if you specify other
|
||||
<option>-P*</option> options, because it is almost always faster
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue