Lines Matching refs:scanning
55 Built-in port-scanning capabilities, with randomizer
135 behavior -- see details below about port-scanning.
228 Port-scanning is a popular method for exploring what's out there. Netcat
242 limited probe data to a UDP connection, and is thus useful as a fast scanning
243 mode just to see what ports the target is listening on. To limit scanning
245 some pitfalls with regard to UDP scanning, described later, but in general it
248 For each range of ports specified, scanning is normally done downward within
249 that range. If the -r switch is used, scanning hops randomly around within
253 prevents netcat from exhibiting any kind of regular pattern in its scanning.
320 A scanning example: "echo QUIT | nc -v -w 5 target 20-250 500-600 5990-7000"
527 The first obvious thing is scanning someone *else's* network for vulnerable
531 scanning, the less likelihood of detection by humans, scan-detectors, or
697 You should be aware of some subtleties concerning UDP scanning. If -z is on,
821 on the basics and the rest fell together pretty quickly. Some port-scanning