Result for 47B6ABB3482986D4CED04F3719520302008622BE

Query result

Key Value
FileName./usr/share/doc/nmap/copyright
FileSize507
MD51D728AE6AC0D2FA73670DEAFD9558682
SHA-147B6ABB3482986D4CED04F3719520302008622BE
SHA-256AAED9E371E28CD1E9947465A3C1B28579B53D351C70F1D26646F887C54EE87F8
SSDEEP6:hEvKnHOsBMLMCRuVD4xLMCdm4WvlS/urcgHVWFor4xLMCd16WmBMLMC0jWoeOjjp:hpHZBKXYDg/urcg1CNX6WmBKQAyNwL1U
TLSHT142F0C0D9210B83718B075847B27B74CD83B3A937291986A4F459092DC1404B0028E5C4
hashlookup:parent-total3
hashlookup:trust65

Network graph view

Parents (Total: 3)

The searched file hash is included in 3 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize444172
MD5FAE45E7EF73D315CD37CA14F8A53F1FE
PackageDescriptionThe Network Mapper nmap is a utility for port scanning large networks, although it works fine for single hosts. The guiding philosophy for the creation of nmap was TMTOWTDI (There's More Than One Way To Do It). This is the Perl slogan, but it is equally applicable to scanners. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do all this with one scanning mode. And you don't want to have 10 different scanners around, all with different interfaces. Thus I incorporated virtually every scanning technique I know into nmap. Specifically, nmap supports: . Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN (stealth) scanning, TCP ftp proxy (bounce attack) scanning SYN/FIN scanning using IP fragments (bypasses packet filters), UDP recvfrom() scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), and Reverse-ident scanning. . nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings, and flexible target and port specification.
PackageMaintainerLaMont Jones <lamont@debian.org>
PackageNamenmap
PackageSectionnet
PackageVersion3.50-1
SHA-17646C287DF4B9495BABFDDADA72EA50455C621F3
SHA-256C21B13E8939C681765C47AD5D6F6AB54E023D0CF4B4791A7BA4505A50C9A2FB8
Key Value
FileSize429044
MD5ECC09FEA6782B3E8CAE37011FC2E0150
PackageDescriptionThe Network Mapper nmap is a utility for port scanning large networks, although it works fine for single hosts. The guiding philosophy for the creation of nmap was TMTOWTDI (There's More Than One Way To Do It). This is the Perl slogan, but it is equally applicable to scanners. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do all this with one scanning mode. And you don't want to have 10 different scanners around, all with different interfaces. Thus I incorporated virtually every scanning technique I know into nmap. Specifically, nmap supports: . Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN (stealth) scanning, TCP ftp proxy (bounce attack) scanning SYN/FIN scanning using IP fragments (bypasses packet filters), UDP recvfrom() scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), and Reverse-ident scanning. . nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings, and flexible target and port specification.
PackageMaintainerLaMont Jones <lamont@debian.org>
PackageNamenmap
PackageSectionnet
PackageVersion3.50-1
SHA-1D4AA222721FC838A8D9CC09EF1B556935ECC4BF2
SHA-256269F01BFAE65C0DE39316A7A722B77791A2D401834FDA01A5D751A07D13049B7
Key Value
FileSize448986
MD5D83E26090AEE843702B6F23381CA0275
PackageDescriptionThe Network Mapper nmap is a utility for port scanning large networks, although it works fine for single hosts. The guiding philosophy for the creation of nmap was TMTOWTDI (There's More Than One Way To Do It). This is the Perl slogan, but it is equally applicable to scanners. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). You just can't do all this with one scanning mode. And you don't want to have 10 different scanners around, all with different interfaces. Thus I incorporated virtually every scanning technique I know into nmap. Specifically, nmap supports: . Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN (stealth) scanning, TCP ftp proxy (bounce attack) scanning SYN/FIN scanning using IP fragments (bypasses packet filters), UDP recvfrom() scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), and Reverse-ident scanning. . nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings, and flexible target and port specification.
PackageMaintainerLaMont Jones <lamont@debian.org>
PackageNamenmap
PackageSectionnet
PackageVersion3.50-1
SHA-189C2505B038A7AFC508B279DFA9227150DE95C1C
SHA-25667FFEE84DE9EA20B8E7C207D2823F8DD607A49D7AC46C92776F58549EFAFD902