From 59f986694ee1c24b027bc9e56171d48d7ef46987 Mon Sep 17 00:00:00 2001 From: Oliver Kiddle Date: Mon, 28 Jul 2003 15:14:49 +0000 Subject: 18900: new iptables and nmap completions --- Completion/Unix/Command/_nmap | 76 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 76 insertions(+) create mode 100644 Completion/Unix/Command/_nmap (limited to 'Completion/Unix/Command/_nmap') diff --git a/Completion/Unix/Command/_nmap b/Completion/Unix/Command/_nmap new file mode 100644 index 000000000..f34be5b31 --- /dev/null +++ b/Completion/Unix/Command/_nmap @@ -0,0 +1,76 @@ +#compdef nmap + +local curcontext="$curcontext" state line suf ret=1 + +_arguments -C \ + '!-sI:zombie host:_hosts' \ + '!-P'{T,S,U}'+:port list' \ + '*-s-[specify scan type]:scan type:((S\:TCP\ SYN\ scan T\:TCP\ connect\(\)\ scan F\:stealth\ FIN\ scan X\:stealth\ Xmas\ tree\ scan N\:stealth\ null\ scan P\:ping\ scanning U\:UDP\ scan O\:IP\ prototocol\ scan I\:idle\ scan A\:ACK\ scan W\:window\ scan R\:RPC\ scan L\:list\ scan))' \ + '-b[specify ftp relay host]:ftp relay host:_hosts' \ + '*-P-[specify probe types and options]:probe type/options:->probe-opts' \ + '-O[enable remote OS identification]' \ + '-6[enable IPv6 support]' \ + '-I[enable TCP reverse ident scanning]' \ + '-f[use tiny fragmented IP packets]' \ + '*-v[verbose mode]' \ + '-h[show help information]' \ + '*-o-[log results]:log format:->log-forms:log filename:_files' \ + '--resume[resume cancelled scan]:log filename:_files' \ + '--append_output[append results to any log files]' \ + '-iL[read target specifications from file]:file:_files' \ + '-iR[scan random hosts]:num hosts' \ + '-p[specify ports to try]:port numbers' \ + '-F[scan only ports listed in services file]' \ + '-D[perform decoy scan]:host list:->host-list' \ + '-S[specify source address]:address:_hosts' \ + '-e[specify interface to use]:network interface:_net_interfaces' \ + '-g[specify source port number]:port number' \ + '--data_length[add random data to packets]:data length' \ + '(-R)-n[skip reverse DNS to speed things up]' \ + '(-n)-R[always do reverse DNS on targets]' \ + '-r[do not ramdomize order in which ports are scanned]' \ + '-ttl[specify IPv4 time to live for sent packets]' \ + '--randomize_hosts[scan hosts in random order]' \ + '-M[specify maximum number of parallel TCP connects]:maximum TCP connects' \ + '--packet_trace[show all packets sent in tcpdump-like format]' \ + '--datadir[specify directory containing data files]:directory:_directories' \ + '-T[specify timing policy]:timing policy:(Paranoid Sneaky Polite Normal Aggressive Insane)' \ + '--host_timeout[specify maximum time for scanning a single host]:timeout (ms)' \ + '--max_rtt_timeout[maximum time for a probe response]:timeout (ms)' \ + '--min_rtt_timeout[minimum time to wait for a probe response]:time (ms)' \ + '--initial_rtt_timeout[specify initial probe timeout]:timeout (ms)' \ + '--max_parallelism[specify max number of scans to perform in parallel]:number' \ + '--min_parallelism[scan at least specified number of ports in parallel]:number' \ + '--scan_delay[specify minimum amount of time between probes]:delay (ms)' \ + '--interactive[go into interactive mode]' \ + '*:host:_hosts' && ret=0 + +case $state in + probe-opts) + _values -S '' 'probe type/option' \ + "0[don't try to ping hosts before scanning]" \ + 'T[use TCP "ping"]' \ + 'S[use SYN packets instead of ACK]' \ + 'U[send UDP probes]' \ + 'E[use a true ping]' \ + 'P[use an ICMP timestamp request]' \ + 'M[use a netmask request]' \ + 'B[use ACK and ICMP echo in parallel]' && ret=0 + ;; + log-forms) + _values 'log format' \ + 'N[human readable (normal)]' \ + 'X[XML]' \ + 'G[grepable]' \ + 'A[all]' \ + 'S[S|