dave@linux:/etc> man nmap
Reformatting nmap(1), please wait...
if this is the case). In this situation, use -S
with your IP address (of the interface you wish to
send packets through).
Another possible use of this flag is to spoof the
scan to make the targets think that someone else is
scanning them. Imagine a company being repeatedly
port scanned by a competitor! This is not a supĀ_
ported usage (or the main purpose) of this flag. I
just think it raises an interesting possibility
that people should be aware of before they go
accusing others of port scanning them. -e would
generally be required for this sort of usage.
-e <interface>
Tells nmap what interface to send and receive packĀ_
ets on. Nmap should be able to detect this but it
will tell you if it cannot.
-g <portnumber>
Sets the source port number used in scans. Many
naive firewall and packet filter installations make
an exception in their ruleset to allow DNS (53) or
Manual page nmap(1) line 722
sorry wrong command
I was thinking ping
anyway yes i read the manual