diff --git a/src/main-conf.c b/src/main-conf.c index 1bfb474d..d6245bce 100644 --- a/src/main-conf.c +++ b/src/main-conf.c @@ -2631,6 +2631,56 @@ static void masscan_help() { printf( +"options:\n" +" \t\t\tAn IP or IP range to scan.\n" +" --range \t\tThe same as \n" +" -p PORT[,PORT...]\t\tSpecifies the port(s) to be scanned.\n" +" --banners\t\t\tSpecifies that banners should be grabbed.\n" +" --rate MS\t\t\tSpecifies the desired rate for transmitting packets.\n" +" -c,--conf FILE\t\tReads in a configuration file.\n" +" --resume FILE\t\tSame as --conf, except enables --apend-output.\n" +" --echo\t\t\tDon't run, but dump the current configuration to a file.\n" +" -e,--adapter IFNAME\t\tUse the named raw network interface.\n" +" --adapter-ip IP\t\tSend packets using this IP address.\n" +" --adapter-port PORT\t\tSends packets using the source PORT number.\n" +" ---adapter-mac MAC\t\tSend packets using the source MAC address.\n" +" --router-mac MAC\t\tSend packets to this destination MAC address.\n" +" --ping\t\t\tIndicates that the scan should include ICMP echo requests.\n" +" --exclude IP[/RANGE]\tBlacklist an IP address or range.\n" +" --excludefile FILE\t\tReads in a list of excluded IP ranges.\n" +" --append-output\t\tAppends output to the output file.\n" +" --iflist\t\t\tList the available network interfaces, and then exits.\n" +" --retries NUM\t\tThe number of retries to attempt.\n" +" --nmap\t\t\tPrint help about nmap-compatibility options.\n" +" --pcap-payloads\t\tReads packets from a libpcpa file.\n" +" --nmap-payloads FILE\tReads an nmap-payloads file.\n" +" --http-user-agent STRING\tUse a custom User-Agent header.\n" +" --open-only\t\t\tReport only open ports.\n" +" --pcap FILE\t\t\tSaves received packets to a libpcap-format file.\n" +" --packet-trace\t\tPrints a summary of the packets sent and received.\n" +" --pfring\t\t\tForce the use of PF_RING driver.\n" +" --resume-index\t\tThe point in the scan when it was paused.\n" +" --resume-count\t\tThe maximum number of probes to send before exiting.\n" +" --shards X/Y\t\tSplits the scan among instances.\n" +" --rotate TIME\t\tRotates the output file.\n" +" --rotate-offset TIME\tAn offset in the rotation time.\n" +" --rotate-dir DIR\t\tThe directory to move rotated files into.\n" +" --seed INT\t\t\tAn integer that seds the random number generator.\n" +" --regress\t\t\tRuns a regression test.\n" +" --ttl TTL\t\t\tSets the TTL of outgoing packets (Default: 255)\n" +" --wait SECONDS\t\tWaits the number of SECONDS after transmitting.\n" +" --offline\t\t\tDon't transmit any packets.\n" +" -sL\t\t\t\tOnly output a list of random addresses and exit.\n" +" --interactive\t\tPrint the results in realtime.\n" +" --output-format FORMAT\tThe output file format.\n" +" --output-filename FILE\tThe output file.\n" +" -oB FILE\t\t\tSaves results to the output FILE in binary format.\n" +" -oX FILE\t\t\tSaves results to the output FILE in XML format.\n" +" -oG FILE\t\t\tSaves results to the output FILE in grepable format.\n" +" -oJ FILE\t\t\tSaves results to the output FILE in JSON format.\n" +" -oL FILE\t\t\tSaves results to the output FILE in a simple list format.\n" +" --readscan BINARY_FILE\tReads a file created by -oB\n" +"\n" "MASSCAN is a fast port scanner. The primary input parameters are the\n" "IP addresses/ranges you want to scan, and the port numbers. An example\n" "is the following, which scans the 10.x.x.x network for web servers:\n"