Changelog Nmap 6.25
o [NSE] Added CPE to smb-os-discovery output.
o [Ncat] Fixed the printing of warning messages for large arguments to
the -i and -w options. [Michal Hlavinka]
o [Ncat] Shut down the write part of connected sockets in listen mode
when stdin hits EOF, just as was already done in connect mode.
o [Zenmap] Removed a crashing error that could happen when canceling a
“Print to File” on Windows:
Traceback (most recent call last):
File “zenmapGUIMainWindow.pyo”, line 831, in _print_cb
File “zenmapGUIPrint.pyo”, line 156, in run_print_operation
GError: Error from StartDoc
This bug was reported by Imre Adácsi. [David Fifield]
o Added some new checks for failed library calls. [Bill Parker]
Nmap (“Network Mapper”) is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.
- Host discovery – Identify hosts on a network.
- Port scanning – Enumerate the open ports on one or more target hosts.
- Version detection – Interrogate network services listening on remote devices to determine the application name and version number.
- OS detection – Remotely determine the operating system and some hardware characteristics of network devices.
- Scriptable interaction with the target – Using Nmap Scripting Engine and the Lua language, customized queries can be made.
- Reverse DNS lookup.
- Find device type information.
- Retrieve MAC addresses
Download version :
Windows : nmap-6.25-setup.exe (26.6 MB)
MacOSX : nmap-6.25.dmg (19.0 MB)
Linux : nmap-6.25-1.i386.rpm (4.8 MB)
Find other version |
Read more in here : http://seclists.org/nmap-hackers/2012/4