$,0(1(B(T(e( 6)SA)c)J)D*MM*V** +.. . ..". ///&/6/ ?/I/P/ Y/ c/n/t//-E0s0 z080 00CP1K111 y22222:2$3 +373@3R3 l3^v3%3 34 4 4 !4.4 E4S4 [4h4q4z4"4 444 434 55 5$545 E5Q566 $6!06R6q66e7M7:8U8p88h8&9)9z<3+C_CwCCC$CCCDD .D;DYDiDrDDD D DD D DDDDD D EEEtFzF FFF F F FF F FF F FG G G,G@G UG_GvGyGGGGG GGG GWG?HFHKHaH hH vHH~H II I%I +I7I =III_IvIIIIIIIIJ!J &J3J9J ?JJJ4J"K :KFK ]KkKKKKKK+KL 'L4LOL$hLL LLL L LL LL L L MgM{M M#MMMkMZN `NnNrN vNN NN N NNNNN N N N O O1OMOOOOOP P%P.P 7POAPPPP3PPP P PQQ1Q"R*R@RTRJoRR=SASJST ,T 9T FT PT^T~TTTYT T UxU*UUsV.V V0VV W WWWW X XX5XDX XXeX~XXXXXXA[Y@Y6YZ}Z}R[}[N\\~a]]po^^_ F`P`X` a`k````C`(a]0aza= baGb?bbcccccc4d;dJdEYdXdvdoeIe ?fKfQfXf _fif of |ff ff fffffff9 gEgOJgg;-h1ih`hGhUDiDii{j&jM&l^tll/m8mJm5;nOqnMnLo\ocozoooopp4p p?p qOq_qr)r .r9rBr JrWrrrrrrr>rgrZsYvss `tltst{ttttttttuvuwz~w w xxx]&x)xbxyy'y.yEy Ky Wyby|y y yyy yyy yyyy yzz8z KzVz^zAsz{{ {{|G|`|Z} ~8~YL~~3~ #A JT ] k u -y -W*H*sj$:Sf: ΅ՅN Z s Ά Ն   "/ 60Ct| }07>!Fh~nOQ0 IWhk"ԊW}Տ-Kdv ֐   '5 <G O[b i v}’ ɒ֒ ݒ   $+ > L Zh{ Ó ɓՓ   Q'y l .; JU [ho͕8Qdsz |B!d ~ З,(Ueu$ Ƙ Ԙ  )< LwZҙ  %O8  Ț ͚ ؚ   - @ M!Xczޛ  /7>FE *Ϝ֜ ڜ  $:OWs(ӟ !'I bmCt ŠoҠ*Bm*/ Zg} x  ãУ !5H[7A0.r:צt5ƩxNǪvIPW^f =!HvZ.ѭ]6^b$+}4 0ͯWaV`; U`gov}  DZұֱݱ *@CG,&?Af>P98prz^/9M*)D&n%89;.jq 4G ɹCֹ3!U   ) 0= S` pz IQ4FPo ! + 6 CQ Xelɾyu  K$!pT  +<M m x    5 HU\a;po1 |,RIm \+NouJn 6 h8jN{:Mrs- 5Hlgm8STtCP<0S3JbDXu4$zD~O[MvUi}p) KWE0:&FZYA?Q .=_{OUeFw9b%|] xPw^L_Q$'C]q7[}rKjk*#cVzvW)A5^@1B,H`#l4i6yf7tf@an*/B9d-!qL2s!gIx(Y3y> Z(h"T XdE`%c .e>;'\RVG/+=G? ~k<2"&# scanned ports:%d/%d hosts shown%s (%s seconds).%s can search results on directories or inside it's own database. Please, select a method by choosing a directory or by checking the search data base option at the 'Search options' tab before start the search%s credits%s is a free and open source utility for network exploration and security auditing.%s is a multi-platform graphical %s frontend and results viewer. It was originally derived from %s.%s is an %s GUI created as part of the Nmap/Google Summer of Code program.%s on %s* TCP sequence index equal to %d and difficulty is "%s".Copy and open a bug report:Fisheye on ringHow to report a bug Like their author, %(nmap)s and %(app)s aren't perfect. But you can help make it better by sending bug reports or even writing patches. If %(nmap)s doesn't behave the way you expect, first upgrade to the latest version available from %(nmap_web)s. If the problem persists, do some research to determine whether it has already been discovered and addressed. Try Googling the error message or browsing the nmap-dev archives at https://seclists.org. Read the full manual page as well. If nothing comes of this, open a bug report at https://issues.nmap.org. Please include everything you have learned about the problem, as well as what version of Nmap you are running and what operating system version it is running on. Code patches to fix bugs are even better than bug reports. Basic instructions for creating patch files with your changes are available at https://nmap.org/data/HACKING A ScanA required module was not found. ACK pingACK scanAbout %sAbout %s and %sAccuracyAccuracy:ActionAddress:AddressesAggressiveAlertAll files (%s)An unexpected error has crashed %(app_name)s. Please copy the stack trace below and open a bug report at https://issues.nmap.org/ The developers will see your report and try to fix the problem.Any extra options to add to the command line.AppendAppend ScanAppend a saved scan to the list of scans in this window.ArgumentsArguments A list of arguments that affect the selected script. Enter a value by clicking in the value field beside the argument name.Attempt to discover the operating system running on remote systems.Attempt to discover the version number of services running on remote ports.B ScanBegin with the specified profile selected. If combined with the -t (--target) option, automatically run the profile against the specified target.By extensionCan't find documentation filesCan't open file to write. %sCan't save fileCan't save to databaseCan't store unsaved scans to the recent scans database: %sCancelCancel ScanCanceledCannot merge scanCannot open selected fileCartesianCauses the requested scan (including ping scans) to split up TCP headers over several packets.Choose a directory to save scans intoChoose fileClassClass:Close WindowClose anywayClose this scan windowClosed ports:CommandCommand InfoCommand:CommentsCompare ResultsCompare Scan Results using DiffiesContributorsControlsCountCrash ReportCreate a new scan profile using the current commandDB LineDateDebug level:Debugging levelDeleting ProfileDescriptionDescription This box shows the categories a script belongs to. In addition, it gives a detailed description of the script which is present in script. A URL points to online NSEDoc documentation.DesignDetailsDifficulty:Disable randomizing scanned portsDisable reverse DNS resolutionDisallowed profile nameDo not allow the scan delay (time delay between successive probes) to grow larger than the given amount of time. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.Do not scan any targets, just list which ones would be scanned (with reverse DNS names if available).Don't check if targets are up before scanning them. Scan every target listed.Don't ping before scanningEdit selected scan profileEmpty Nmap CommandEnable IPv6 scanning.Enable OS detection (-O), version detection (-sV), script scanning (-sC), and traceroute (--traceroute).Enable all advanced/aggressive optionsEntering the text into the search performs a keyword search - the search string is matched against every aspect of the host. To refine the search, you can use operators to search only specific fields within a host. Most operators have a short form, listed. target: (t:) - User-supplied target, or a rDNS result. os: - All OS-related fields. open: (op:) - Open ports discovered in a scan. closed: (cp:) - Closed ports discovered in a scan. filtered: (fp:) - Filtered ports discovered in scan. unfiltered: (ufp:) - Unfiltered ports found in a scan (using, for example, an ACK scan). open|filtered: (ofp:) - Ports in the "open|filtered" state. closed|filtered: (cfp:) - Ports in the "closed|filtered" state. service: (s:) - All service-related fields. inroute: (ir:) - Matches a router in the scan's traceroute output. Entering the text into the search performs a keyword search - the search string is matched against the entire output of each scan. To refine the search, you can use operators to search only within a specific part of a scan. Operators can be added to the search interactively if you click on the Expressions button, or you can enter them manually into the search field. Most operators have a short form, listed. profile: (pr:) - Profile used. target: (t:) - User-supplied target, or a rDNS result. option: (o:) - Scan options. date: (d:) - The date when scan was performed. Fuzzy matching is possible using the "~" suffix. Each "~" broadens the search by one day on "each side" of the date. In addition, it is possible to use the "date:-n" notation which means "n days ago". after: (a:) - Matches scans made after the supplied date (YYYY-MM-DD or -n). before (b:) - Matches scans made before the supplied date(YYYY-MM-DD or -n). os: - All OS-related fields. scanned: (sp:) - Matches a port if it was among those scanned. open: (op:) - Open ports discovered in a scan. closed: (cp:) - Closed ports discovered in a scan. filtered: (fp:) - Filtered ports discovered in scan. unfiltered: (ufp:) - Unfiltered ports found in a scan (using, for example, an ACK scan). open|filtered: (ofp:) - Ports in the "open|filtered" state. closed|filtered: (cfp:) - Ports in the "closed|filtered" state. service: (s:) - All service-related fields. inroute: (ir:) - Matches a router in the scan's traceroute output. Error creating the per-user configuration directoryError executing commandError loading fileError parsing fileError parsing ndiff outputError parsing the configuration fileError running ndiffError saving snapshotExcluded hosts/networksExclusion fileExpressions Extra options defined by userExtraports (%s)FIN scanFTP bounce attackFailedFamilyFast scanFilter HostsFiltered ports:FingerprintFinished on:FisheyeFragment IP packetsFramesGeneralGeneral InfoGeneral informationGive arguments to certain scripts that use them. Arguments are = pairs, separated by commas. Values may be Lua tables.Give up on a host if it has not finished being scanning in this long. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.GreenHelpHighlightHighlight definitionsHostHost DetailsHost Filter:Host StatusHostnameHostname:HostnamesHostsHosts ViewerHosts down:Hosts scanned:Hosts up:Hosts viewerHow to Report a BugICMP netmask requestICMP pingICMP timestamp requestIPIP IDIP ID SequenceIP protocol scanIPProto probesIPv4:IPv6 supportIPv6:Idle Scan (Zombie)Import errorIncrease verbosity of the output. May be used more than once to get even more verbosityIndex:InfoInitial probe timeoutInsaneInterpolationLast boot:LayoutList of scripts A list of all installed scripts. Activate or deactivate a script by clicking the box next to the script name.List scanLower ring gapMAC:MaemoMaimon scanMatchMax RetriesMax hosts in parallelMax outstanding probesMax probe timeoutMax scan delayMax time to scan a targetMethodMin delay between probesMin hosts in parallelMin outstanding probesMin probe timeoutNSE scripts (%s)NameName - Type:Name:NamesNavigationNever allow more than the given number of probes to be outstanding at a time. May be set to 1 to prevent Nmap from sending more than one probe at a time to hosts.Never do reverse DNS. This can slash scanning times.New _Profile or CommandNmap OutputNmap Output PropertiesNmap Version:Nmap XML files (%s)Nmap XML format (.xml)Nmap text format (.nmap)No OS information.No filename extensionNo host selected.No module named dbapi2.pysqlite2 or sqlite3No node selectedNo port scanNo search method selected!No sequence information.No traceroute information available.Non-TCP scans: Non-root userNoneNormalNot AvailableNot availableNothing to saveNull scanOSOS ClassesOS FamilyOS GenerationOnly scan ports named in the nmap-services file which comes with Nmap (or nmap-protocols file for -sO).Open a new scan windowOpen ports:Open the results of a previous scanOperating SystemOperating system detectionOption to choose targets at random. Tells Nmap how many IPs to generate. 0 is used for a never-ending scan.OtherOther optionsPDFPNGPacket traceParanoidParse errorPingPing optionsPlease wait.PolarPolitePortPort-Protocol-State:Ports (%s)Ports / HostsPorts to scanPorts usedPostScriptPrint a summary of every packet sent or received.Print more information about the scan in progress. Open ports are shown as they are found as well as completion time estimates.Print the current scanPrint...ProfileProfile EditorProfile InformationProfile nameProfile:ProtocolProtocol:Provide a port number and Nmap will send packets from that port where possible.QuitQuit the applicationRTTReads target list specification from an input file.ReasonsRedRemove ScanReport a bugRing gapRun %s with the specified args.Run the given scripts. Give script names, directory names, or category names. Categories are "safe", "intrusive", "malware", "discovery", "vuln", "auth", "external", "default", and "all". If blank, scripts in the "default" category are run.RunningSCTP INIT ping probesSCTP INIT port scanSCTP cookie-echo port scanSCTP is a layer 4 protocol used mostly for telephony related applications.SCTP is a layer 4 protocol used mostly for telephony related applications. This is the SCTP equivalent of a TCP SYN stealth scan.SVGSYN pingSame as ACK scan except that it exploits an implementation detail of certain systems to differentiate open ports from closed ones, rather than always printing "unfiltered" when a RST is returned. Save All Scans to _DirectorySave ChangesSave GraphicSave ScanSave TopologySave all scans into a directorySave current scan resultsSc_anScanScan IP protocols (TCP, ICMP, IGMP, etc.) to find which are supported by target machines.Scan InfoScan OutputScan UDP ports. UDP is in general slower and more difficult to scan than TCP, and is often ignored by security auditors.Scan at least this many hosts in parallel.Scan by spoofing packets from a zombie computer so that the targets receive no packets from your IP address. The zombie must meet certain conditions which Nmap will check before scanning.Scan is runningScan no more than this many hosts in parallel.Scan optionsScan ports in order instead of randomizing them.Scan random hostsScan type:Scan using the connect system call. This is like SYN scan but less stealthy because it makes a full TCP connection. It is the default when a user does not have raw packet privileges or is scanning IPv6 networks.Scanned ports:ScansScript argumentsScript scanScriptingScripting options (NSE)Scripts to runSearch Scan ResultsSearch ScansSearch for a scan resultSearch for host by criteriaSearch:Select File Type:Select Scan ResultSelect script filesSend SCTP INIT chunk packets to see if targets are up. Give a list of ports or leave the argument blank to use a default port.Send an ICMP address mask request probe to see if targets are up.Send an ICMP echo request (ping) probe to see if targets are up.Send an ICMP timestamp probe to see if targets are up.Send fake decoy probes from spoofed addresses to hide your own address. Give a list of addresses separated by commas. Use RND for a random address and ME to set the position of your address.Send one or more ACK probes to see if targets are up. Give a list of ports or leave the argument blank to use a default port.Send one or more SYN probes to see if targets are up. Give a list of ports or leave the argument blank to use a default port.Send one or more UDP probes to see if targets are up. Give a list of ports or leave the argument blank to use a default port.Send one or more raw IP protocol probes to see if targets are up. Give a list of protocols or leave the argument blank to use a default listSend probes with no flags set (TCP flag header is 0). Null scan can differentiate "closed" and "open|filtered" ports on some systems.Send probes with the ACK flag set. Ports will be marked "filtered" or "unfiltered". Use ACK scan to map out firewall rulesets.Send probes with the FIN and ACK bits set. Against some BSD-derived systems this can differentiate between "closed" and "open|filtered" ports.Send probes with the FIN bit set. FIN scan can differentiate "closed" and "open|filtered" ports on some systems.Send probes with the FIN, PSH, and URG flags set, lighting the packets up like a Christmas tree. Xmas tree scan can differentiate "closed" and "open|filtered" ports on some systems.Send probes with the SYN flag set. This is the most popular scan and the most generally useful. It is known as a "stealth" scan because it avoids making a full TCP connection.SequencesServiceServicesServices:Set IPv4 time to live (ttl)Set network interfaceSet source IP addressSet source portSet the IPv4 time-to-live field in sent packets to the given value.Set the timing template for IDS evasion.Set the timing template for faster scan. Used when on a reasonably fast and reliable network.Set the timing template for the fastest scan. Used when on a fast network or when willing to sacrifice accuracy for speed.Set the timing template to not modify the default Nmap value.Set the timing template to slow down the scan to use less bandwidth and target machine resources.Show all information sent and received by the scripting engine.Show the topology anywayShows the application helpSkip the port scanning phase. Other phases (host discovery, script scan, traceroute) may still run.SneakySoC 2007Sorry, the name "%s" is not allowed due to technical limitations. (The underlying ConfigParser used to store profiles does not allow it.) Choose a different name.SourceSource optionsSpecial fieldsSpecifies a comma-separated list of targets to exclude from the scan.Specifies a newline-, space-, or tab-delimited file of targets to exclude from the scan.Specify a scan result file in Nmap XML output format. Can be used more than once to specify several scan result files.Specify a target to be used along with other options. If specified alone, open with the target field filled with the specified targetSpecify the IP address of the interface you wish to send packets through.Started on:StateState:StatusSymmetricTCP *TCP SYN scanTCP SequenceTCP TS SequenceTCP TimestampTCP connect scanTCP scan: TTLTargetTarget list fileTarget optionsTarget:Targets (optional): Tells Nmap what interface to send and receive packets on.TextThe file is not an Nmap XML output file. The parsing error that occurred was %sThe filename "%s" does not have an extension, and no specific file type was chosen. Enter a known extension or select the file type from the list.The given scan has unsaved changes. What do you want to do?The ndiff process terminated with status code %d.The window you are trying to close has a scan running at the background. What do you want to do?There are %u scans still running. Wait until they finish and then save.There are no scans with results to be saved. Run a scan with the "Scan" button first.There is a scan still running. Wait until it finishes and then save.There is no command to execute. Maybe the selected/typed profile doesn't exist. Please, check the profile name or type the nmap command you would like to execute.There is no file type known for the filename extension "%s". Enter a known extension or select the file type from the list.There was an error creating the directory %s or one of the files in it. The directory is created by copying the contents of %s. The specific error was %s %s needs to create this directory to store information such as the list of scan profiles. Check for access to the directory and try again.There was an error getting the list of scripts from Nmap. Try upgrading Nmap.There was an error loading the documentation file %s (%s). See the online documentation at %s.There was an error parsing the configuration file %s. The specific error was %s %s can continue without this file but any information in it will be ignored until it is repaired.There was an error running the ndiff program. There was an error while merging the new scan's XML: %sThere was an error while parsing the XML file generated from the scan: %sThis error occurred while trying to open the file: %sThis means that the nmap executable was not found in your system PATH, which isThis option specifies which ports you want to scan and overrides the default.This scan has not been run yet. Start the scan with the "Scan" button first.TimingTiming and performanceTiming template: TopologyTopology is disabled because too many hosts can cause it to run slowly. The limit is %d hosts and there are %d.Trace routes to targetsTrace script executionTrace the network path to each target after scanning. This works with all scan types except connect scan (-sT) and idle scan (-sI).TracerouteTraceroute on port %s/%s totalized %d known hops.TranslationTry sending a probe to each port no more than this many times before giving up.Try to maintain at least the given number of probes outstanding during a scan. Common usage is to set to a number higher than 1 to speed up scans of poorly performing hosts or networks.Trying to closeTypeUDP probesUDP scanUnknownUnknown HostUnknown filename extensionUnknown versionUnnamed profileUnsavedUnsaved changesUp time:Use DIR as the user configuration directory. Default: %defaultUse an FTP server to port scan other hosts by sending a file to each interesting port of a target host.Use decoys to hide identityUse the Nmap Scripting Engine to gain more information about targets after scanning them.Use the time given as the initial estimate of round-trip time. This can speed up scans if you know a good time for the network you're scanning.Used ports:ValuesValues:VendorVendor:Verbosity levelVerbosity level:VersionVersion detectionViewWait at least the given amount of time between each probe sent to a given host. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.Wait at least this long for a probe response before giving up or retransmitting the probe. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.Wait no longer than this for a probe response before giving up or retransmitting the probe. Time is in seconds by default, or may be followed by a suffix of 'ms' for milliseconds, 's' for seconds, 'm' for minutes, or 'h' for hours.WeightedWhen even verbose mode doesn't provide sufficient data for you, debugging level is available to show more detailed output.Window scanWritten byXmas Tree scanYellowYou are trying to run %s with a non-root user! Some %s options need root privileges to work.You must provide a name for this profile.Your profile is going to be deleted! Click Ok to continue, or Cancel to go back to Profile Editor.Zoom[%d] service: %s_About_Edit Selected Profile_Help_New Window_Open Scan_Open Scan in This Window_Profile_Report a bug_Save Scan_Toolsand spread factorclosed portdatedetailsfiltered porthighlight colorhostnameipopen portplus the extra directoriesplus the extra directoryport listing titletext colorunknownwith interest factorProject-Id-Version: Zenmap Report-Msgid-Bugs-To: dev@nmap org POT-Creation-Date: 2013-04-09 16:41-0700 PO-Revision-Date: 2014-12-06 13:59+0800 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Last-Translator: Jiang Jie Language-Team: Chinese Language: zh # 已扫描端口:显示 %d/%d主机%s (%s秒)。%s可以搜索目录中或自己数据库中的结果。在开始搜索之前,请通过选择一个目录或者'搜索选项'标签中的搜索数据库选项来指定一种方法。%s开发团队%s是一款免费开源的软件,用于网络探测和安全审计。%s是一款跨平台图形化%s前端,也是一款结果浏览器。最初由%s衍生而来。%s是%s的图形界面,是Nmap/Google Summer of Code的一个子项目。 对于中文翻译有任何建议或意见,请截图发送至: jerrynwin () gmail com, 谢谢!%s on %s* TCP序列索引%d, 难度是"%s".请发邮件至: issues.nmap.org:Fisheye on ring如何报告Bug 就像它的作者一样, %(nmap)s和%(app)s并不完美。但是你可以通过发送Bug报告甚至提供补丁来让它变得更好。如果%(nmap)s没有达到你预期的效果, 先升级到最新版本,你可以在%(nmap_web)s上下载到。如果问题仍然没有解决,自己做些研究,看看这个问题是否已经被发现并提出了。尝试用Google搜索错误信息,或者查看nmap开发者文档(http://seclists.org/)。仔细阅读整个手册,如果仍然没有结果,发送Bug报告邮件到https://issues.nmap.org. 请在邮件中囊括所有你搜集到的信息,包括: 你所使用的Nmap版本以及操作系统版本。 提供补丁比报告Bug更受欢迎,https://nmap.org/data/HACKING上有编写补丁的基本介绍。 <无><特殊字段><未定义><未知>扫描A未找到需要的模块。 ACK pingACK扫描关于%s关于%s和%s精确度精确度:启动地址:地址列表侵略警告所有文件 (%s)未知的错误造成%(app_name)s崩溃。请复制下面的堆栈追踪记录发送到https://issues.nmap.org/ 邮件列表。Nmap开发者们会看见你的报告并尽力修复错误。需要追加到命令行内的额外选项。追加追加扫描在当前窗口新增一个保存的扫描。参数参数 脚本接受的参数列表,点击参数名旁的文本框,输入参数值。尝试识别远程目标的操作系统。尝试识别远程目标的服务版本。扫描B用选定的配置运行,如果同时使用-t (--target)选项,自动把该配置用于指定目标。自定义扩展名未找到说明文档打开文件失败。 %s不能保存文件保存到数据库失败未保存的扫描不能保存到当前扫描数据库: %s取消取消扫描取消合并扫描失败打开文件失败笛卡尔坐标导致请求的扫描(包括ping扫描)分割TCP头部到多个数据包中。选择保存扫描目录选择文件类别:类别:关闭窗口始终关闭关闭扫描窗口未开放端口:命令命令信息命令:备注结果比对用Diff比较扫描结果贡献者操作面板数量崩溃报告使用当前命令创建一个新的扫描配置DB Line日期调试级别:调试级别删除配置描述描述 这个窗口显示脚本所属类别。此外,还显示脚本的详细描述和指向NSEDoc在线文档的链接。设计明细难度:禁用随机打乱已扫描端口禁用反向DNS解析不允许的配置名不允许扫描延迟(成功探测之间的延迟)多于给定的时间。时间单位默认为秒,可以以'ms','s','m','h'结尾来指定单位为毫秒,秒,分钟或者小时。不扫描任何目标, 仅仅列出将要扫描的主机列表(如果有,则加上它们的反向DNS域名).在扫描主机之前不检查目标是否在线,扫描列出的所有目标。扫描之前不ping远程主机编辑所选扫描配置空Nmap命令启用IPv6扫描。开启操作系统检测(-O), 服务版本检测(-sV), 脚本扫描(-sC), 和路由追踪(--traceroute).启用所有高级/攻击性选项在文本框中输入信息来进行关键词搜索- 关键词匹配主机信息的任一内容。 你可以用运算符来筛选主机信息内指定的字段。大部分的运算符都有缩写形式,如下: target: (t:) - 用户提供的目标,或者是rDNS结果。 os: - 所有和操作系统相关的字段。 open: (op:) - 扫描中发现的开放端口。 closed: (cp:) - 扫描中发现的未开放端口。 filtered: (fp:) - 扫描中发现的被过滤端口。 unfiltered: (ufp:) - 扫描中发现的未被过滤的端口(例如:使用ACK扫描)。 open|filtered: (ofp:) - 属于"open|filtered"状态的端口。 closed|filtered: (cfp:) - 属于"closed|filtered"状态的端口。 service: (s:) - 所有与服务相关的字段。 inroute: (ir:) - 与扫描的路由追踪输出中匹配的路由器。 在文本框中输入信息来进行关键词搜索 - 关键词匹配扫描输出中的所有内容。 你可以用运算符来筛选扫描中指定部分。你可以通过点击表达式按钮,交互地加入运算符, 或者你可以手动在搜索框内写入运算符。大多数运算符有缩写形式,如下: 创建用户配置目录出错执行命令错误加载文件出错解析文件错误解析ndiff输出时出错。解析配置文件出错运行ndiff失败保存截图时出错例外的主机/网络例外文件表达式用户指定的额外选项额外端口(%s)FIN扫描FTP bounce攻击失败族快速扫描过滤主机过滤端口:指纹结束于:Fisheye分片IP包Frames常规常规信息一般信息提供参数给指定的脚本使用。参数是以逗号分割的=对,值可以为Lua中的关系表类型。如果在给定时间内扫描仍未完成,则放弃这个主机。时间单位默认为秒,可以以'ms','s','m','h'结尾来指定单位为毫秒,秒,分钟或者小时。绿帮助高亮高亮定义主机主机明细主机过滤:主机状态主机名主机名:主机名主机查看主机信息离线主机:扫描主机:在线主机:查看主机信息如何报告BugICMP网络掩码请求ICMP pingICMP时间戳请求IPIP IDIP IP序列IP协议扫描IPProto探测IPv4IPv6支持IPv6Idle扫描(Zombie)导入错误提高输出的详细级别,可以多次使用来获得更高的详细级别。索引:信息初始化探测超时疯狂插值最后启动:布局脚本列表 所有已安装的脚本列表。勾选脚本名旁的复选框选择是否启动该脚本。 列表扫描Lower ring gapMAC地址:MaemoMaimon扫描匹配最大重试次数最大并行探测主机数量最大未解决扫描数最大探测超时最大扫描延迟扫描目标最大用时方法最小探测间隔延迟最小并行探测主机数量最小未解决扫描数最小探测超时NSE脚本 (%s)名称名称 - 类型:名称:脚本名导航不允许多于给定数量的扫描变为未解决扫描。可以设置为1来阻止Nmap一次发起多个主机探测。始终不启用反向DNS解析,这样可以消减扫描时长。新的配置或命令(_P)Nmap输出Nmap输出属性Nmap版本:Nmap XML文件 (%s)Nmap XML格式 (.xml)Nmap文本格式 (.nmap)无操作系统信息。无文件扩展名未选择主机。未找到dbapi2.pysqlite2或者sqlite3模块未选择节点无端口扫描未选择搜索方法!无序列信息。没有可用的路由追踪信息。Non-TCP扫描非root用户无正常未知未知并未做任何修改Null扫描操作系统操作系统类别操作系统族OS Generation仅扫描nmap-services文件中包含的端口(使用-sO选项时,仅扫描nmap-protocols文件内包括的服务)。打开一个新的扫描窗口开放端口:打开之前扫描结果操作系统操作系统检测扫描随机目标选项。 告诉Nmap生成多少随机IP. 0代表无穷个IP.其它其它选项PDFPNG数据包追踪偏执解析错误PingPing选项请等待。极坐标礼貌端口端口-协议-状态:端口 (%s)端口/主机要扫描的端口使用端口PostScript打印每个数据包的摘要。打印更多扫描进程中的信息。开放端口的发现会和预计完成时间同时显示。打印当前扫描打印...配置配置编辑器配置信息配置文件名配置:协议协议指定一个合法的端口号,Nmap会从这端口发送数据包。退出退出程序RTT从输入文件读取指定目标列表。原由红移除扫描报告BugRing gap使用指定参数 %s 运行。执行指定的脚本。指定脚本名,目录名或者类别名。类别有:"safe", "intrusive", "malware", "discovery", "vuln", "auth", "external", "default", and "all". 如果为空,在"default"类别中的脚本会被执行。运行中SCTP INIT ping探测SCTP INIT端口扫描SCTP cookie-echo端口扫描SCTP是运行在第四层上的协议,主要用于电化学相关的应用。SCTP是运行在第四层上的协议,主要用于电话学相关应用。这个类似于TCP SYN stealth扫描。SVGSYN ping和ACK扫描一样,除了它利用确定系统的实现细节来区分开放端口和未开放端口,而不是每次收到返回的RST标识都显示为"unfiltered". 保存所有扫描到目录(_D)保存更改保存图表保存扫描保存拓扑保存所有扫描到单个目录保存当前扫描结果扫描(_a)扫描扫描目标机器支持的IP协议总类(TCP, ICMP, IGMP等等)。扫描信息扫描结果扫描UDP端口。UDP扫描一般比TCP扫描更慢并且难度更大,也经常被安全审计员们忽略。最少并行探测以上数量的主机。从僵尸主机上发送伪装数据包来扫描,这样目标主机不会收到来自你的IP地址的数据包。Nmap在扫描前会检查僵尸主机是否满足要求。扫描仍在运行最多并行探测以上数量的主机。扫描选项按序扫描端口。扫描随机主机扫描类型利用connect系统调用扫描。这类似于SYN扫描但是没有其隐秘,因为它建立一次完整的TCP连接。当用户没有原始套接字权限时或者扫描IPv6网络时,这是默认的扫描方式。已扫描端口:扫描脚本参数脚本扫描脚本脚本选项(NSE)执行脚本搜索扫描结果搜索扫描搜索扫描结果按条件搜索主机搜索:选择文本类型:选择扫描结果选择脚本文件发送SCTP INIT数据包分块来检测目标主机是否在线。提供要扫描的端口列表,或者把端口列表参数留空来选择默认端口。发送ICMP地址掩码请求探测主机是否在线。发送一个ICMP echo request(ping)包探测目标是否在线。发送ICMP时间戳探测主机是否在线。使用伪装地址发送诱骗探测来隐藏自己的地址。指定一组以逗号分隔的地址,RND代表随机地址,ME代表自己的地址。发送一个或多个ACK探测来检测目标主机是否在线。提供要扫描的端口列表,或者把端口列表参数留空来选择默认端口。发送一个或多个SYN探测来检测目标主机是否在线。提供要扫描的端口列表,或者把端口列表参数留空来选择默认端口。发送一个或多个UDP探测来检测目标主机是否在线。提供要扫描的端口列表,或者把端口列表参数留空来选择默认端口。发送一个或多个原始IP协议探测来检测目标主机是否在线。提供协议列表,或者把协议列表参数留空来选择默认列表。发送不带任何标识位的包(TCP标识头部为0)。Null扫描在一些系统上可以区分"closed"和"open|filtered"的端口。发送带有ACK标识位的包进行探测。端口会被标记为"filtered"或者"unfiltered". 使用ACK扫描制定出防火墙的规则集。发送带有FIN和ACK标识位的包进行探测。对于一些类Unix系统,这样可以区分"closed"和"open|filtered"的端口。发送带有FIN标识位的包进行探测。FIN扫描在一些系统中可以区分"closed"和"open|filtered"的端口.发送带有FIN, PSH, URG标识位的探测时, 像颗圣诞树一样指明所有的包。 Xmas Tree扫描可以区分一些系统上的"closed"和"open|filtered"的端口。发送带有SYN标识位的包进行探测。这是最流行的扫描方式,一般来说,也是最实用的一种。它也被称作"stealth"扫描,因为这种扫描并不建立一次完整的TCP连接。序列服务服务服务:设置IPv4生存时间(ttl)设置网卡设置源IP地址设置源端口设置已发送包的IPv4生存时间字段为指定的值。为IDS规避设置时间模版。为快速扫描设置定时模版,在合理稳定的网络中使用。为全速扫描设置定时模版, 在处于快速网络或者用户愿意牺牲精确度来换取速度时使用。设置定时模版以更改Nmap的默认值。设置定时模版来降低扫描的速度,以减少带宽和目标机器资源的利用。显示所有脚本引擎发送和接收到的信息。始终显示拓扑结构打开程序帮助跳过端口扫描阶段。其它阶段(主机发现,脚本扫描,路由追踪)任然进行。鬼祟SoC 2007抱歉,"%s"由于技术限制是不允许的。( 用于存放配置的ConfigParser不允许) 请选择另外一个名字。源源选项特殊字段指定一个逗号分割的例外扫描列表。为扫描指定一个以换行符,空格或者制表符分割的例外目标文件。指定扫描结果输出为Nmap XML格式, 可以多次使用来指定多个扫描结果文件。指定单个目标使用特定选项,如果单独指定,目标字段为所指定的目标。指定你希望用于发送数据包的接口的IP地址。开始于:状态状态:状态对称TCP *TCP SYN扫描TCP序列TCP TS序列TCP时间戳TCP connect扫描TCP扫描:TTL目标目标列表文件目标选项目标:目标(可选):指定发送和接收数据包的网卡。文本这个文件不是Nmap XML输出文件。解析时发生错误: %s文件名"%s"没有扩展名,未选择指定的文件类型。 输入一个已知的扩展名或者选择列表中的文件类型。选定的扫描未保存更改, 请选择:ndiff程序终止,返回状态码: %d.您想要关闭的窗口后台有扫描正在运行, 请选择:有%u个扫描正在运行,等待其运行完后再保存。没有扫描结果需要保存。请先点击"扫描"按钮运行一次扫描。有扫描正在运行,等待其运行完后再保存。没有命令可执行,也许选择的配置不存在。请检查配置名称,或者直接执行nmap命令。没有与文件扩展名"%s"相符的文件类型。 输入一个已知的扩展名或者选择列表中的文件类型。创建目录%s或其中某个文件失败。复制%s内容时创建该目录,具体错误为: %s %s需要创建该目录用于保存扫描配置等信息。请检查目录访问权限。检测脚本列表失败,请尝试更新Nmap.加载说明文档出错%s (%s). 请查阅在线文档%s.解析配置文件%s时出错。 具体错误为: %s %s可以不需要该文件继续执行,但在修复之前,该文件中的任何信息都会被忽略。运行ndiff时出错。 合并新的扫描XML文件时出错: %s解析扫描输出XML文件出错: %s打开文件时发生如下错误: %snmap不在环境变量PATH中,您系统的PATH变量为:这个选项指定要扫描的端口,覆盖默认值。这个扫描并未运行,点击"扫描"按钮来启动。定时时间和性能时间模版:拓扑拓扑结构未启用,由于过多的主机会使其运行很缓慢。 最大主机数量限制为%d,而当前存在%d个主机。追踪到目标的路径追终脚本执行扫描完成后追踪每个目标的网络路径。除了connect扫描(-sT)和idle扫描(-sI)外的其它扫描类型都支持。路由追踪%s/%s端口路由追踪信息总共%d次已知的跳。翻译发送至少给定次数的探测到每个端口。尝试维持至少这么多数量的未解决扫描。一般用法是把这个设为大于1的数值,以加速目标为网络质量较差的主机或网络的扫描。尝试关闭类型UDP探测UDP扫描未知未知主机未知文件扩展名未知版本未命名配置未保存未保存更改上线时间:使用DIR目录作为用户配置文件存放目录,默认为: %defalut利用FTP服务器发送文件到感兴趣的目标端口来进行端口扫描。使用诱骗来隐藏身份扫描目标主机之后利用Nmap脚本引擎来获得更多信息。用给定时间作为往返初始预计时间。如果你了解你要扫描的网络,这可以加速扫描。已使用端口:值值:供应商供应商:详细级别详细级别:版本版本检测视图发送到主机探测间的等待不少于给定的时间。时间单位默认为秒,可以以'ms','s','m','h'结尾来指定单位为毫秒,秒,分钟或者小时。最少花费给定时间来等待探测回复和重传探测。时间单位默认为秒,可以以'ms','s','m','h'结尾来指定单位为毫秒,秒,分钟或者小时。最多花费给定时间来等待探测回复和重传探测。时间单位默认为秒,可以以'ms','s','m','h'结尾来指定单位为毫秒,秒,分钟或者小时。加权如果详细输出模式仍然不能提供你足够的信息,增加调试级别能够输出更多的细节信息。滑动窗口扫描作者Xmas Tree扫描黄您正在试图以非root身份运行%s! 一些%s选项需要root权限。您必须为这个配置命名。您的配置将被删除!点击Ok继续,或者点击取消回到配置编辑器。缩放[%d] 服务: %s关于(_A)编辑选中配置(_E)帮助(_H)新建窗口(_N)打开扫描(_O)在当前窗口打开扫描(_O)配置(_P)报告Bug(_R)保存扫描(_S)工具(_T)and spread factor未开放端口日期明细被过滤端口高亮颜色主机名ip开放端口加上额外的目录加上额外的目录端口列表标题文本颜色未知with interest factor