o [Zenmap] Fixed a hang that would occur on Mac OS X 10.7. A symptom of the hang was this message in the system console: “Couldn’t recognize the image file format for file ‘/Applications/Zenmap.app/Contents/MacOS/../Resources/share/zenmap/pixmaps/radialnet/padlock.png'”.o [Zenmap] Fixed a crash that happened when activating the host filter. File zenmapCoreSearchResult.pyo”, line 155, in match_os KeyError: ‘osmatches’o Fixed an error that occurred when scanning certain addresses like192.168.0.0 on Windows XP:
get_srcaddr: can’t connect socket: The requested address is not valid in its context. nexthost: failed to determine route to 10.80.0.0
o Fixed a bug that caused Nmap to fail to find any network interface when at least one of them is in the monitor mode. The fix was to define the ARP_HRD_IEEE80211_RADIOTAP 802.11 radiotap header identifier in the libdnet-stripped code. Network interfaces that are in this mode are used by radiotap for 802.11 frame injection and reception. The bug was reported by Tom Eichstaedt and Henri Doreau.
o Fixed the greppable output of hosts that time-out (when –host-timeout was used and the host timed-out after something was received from that host).
o [Zenmap] Updated the version of Python used to build the Windows release from 2.7.1 to 2.7.3 to remove a false-positive security alarm flagged by tools such as Secunia PSI. There was a minor
vulnerability in certain Python27.dll web functionality (which Nmap doesn’t use anyway) and Secunia was flagging all software which includes that version of Python27.dll. This update should prevent the false alarm.
|Zenmap Sample ScreenShoot|
Nmap (“Network Mapper”) is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.
- Host discovery – Identify hosts on a network.
- Port scanning – Enumerate the open ports on one or more target hosts.
- Version detection – Interrogate network services listening on remote devices to determine the application name and version number.
- OS detection – Remotely determine the operating system and some hardware characteristics of network devices.
- Scriptable interaction with the target – Using Nmap Scripting Engine and the Lua language, customized queries can be made.
- Reverse DNS lookup.
- Find device type information.
- Retrieve MAC addresses.
Download Version :
Windows : nmap-6.01-setup.exe (26.2 MB)
Mac OS : nmap-6.01.dmg (18.4 MB)
nmap-6.01.tar.bz2 (21.6 MB)
nmap-6.01-1.i386.rpm (4.4 MB)
Find Other Version |
Read more in here : http://nmap.org/
Our Post Before :