ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: Nmap 4.00 Released



> -----Original Message-----
> From: Fyodor [mailto:fyodor@xxxxxxxxxxxx] 
> Sent: Tuesday, January 31, 2006 9:10 PM
> To: bugtraq@xxxxxxxxxxxxxxxxx
> Subject: Nmap 4.00 Released
> 
> Bugtraqers,
> 
> Insecure.Org is pleased to announce the immediate, free availability
> of the Nmap Security Scanner version 4.00 from
> http://www.insecure.org/nmap/ .
> 
> I try not to burden the Bugtraq list with more than one Nmap
> announcement per year. So I encourage those of you who would like to
> hear about new Nmap releases as they happen to join the low-volume
> nmap-hackers list at
> http://cgi.insecure.org/mailman/listinfo/nmap-hackers .
> 
> I just did an interview for SecurityFocus which provides some further
> details on this release: http://www.securityfocus.com/columnists/384
> 
> CHANGES:
> 
> Nmap has undergone many substantial changes since our last major
> release (3.50 in February 2004) and we recommend that all current
> users upgrade. Here are the most important improvements made in the 36
> intermediate releases since 3.50:
> 
> o Added the ability for Nmap to send and properly route raw ethernet
>   frames containing IP datagrams rather than always sending the
>   packets via raw sockets. This is particularly useful for Windows,
>   since Microsoft has disabled raw socket support in XP.  Nmap tries
>   to choose the best method at runtime based on platform, though you
>   can override it with the new --send-eth and --send-ip options.
> 
> o Added ARP scanning (-PR). Nmap can now send raw ethernet ARP
>   requests to determine whether hosts on a LAN are up, rather than
>   relying on higher-level IP packets (which can only be sent after a
>   successful ARP request and reply anyway).  This is much faster and
>   more reliable (not subject to IP-level firewalling) than IP-based
>   probes.  It is now used automatically for any hosts that are
>   detected to be on a local ethernet network, unless --send-ip was
>   specified.
> 
> o Added the --spoof-mac option, which asks Nmap to use the given MAC
>   address for all of the raw ethernet frames it sends.  Valid
>   --spoof-mac argument examples are "Apple", "0", "01:02:03:04:05:06",
>   "deadbeefcafe", "0020F2", and "Cisco".
> 
> o Rewrote core port scanning engine, which is now named ultra_scan().
>   Improved algorithms make this faster (often dramatically so) in
>   almost all cases.  Not only is it superior against single hosts, but
>   ultra_scan() can scan many hosts (sometimes hundreds) in parallel.
>   This offers many efficiency/speed advantages.  For example, hosts
>   often limit the ICMP port unreachable packets used by UDP scans to
>   1/second.  That made those scans extraordinarily slow in previous
>   versions of Nmap.  But if you are scanning 100 hosts at once,
>   suddenly you can receive 100 responses per second.  Spreading the
>   scan amongst hosts is also gentler toward the target hosts.
> 
> o Overhauled UDP scan.  Ports that don't respond are now classified as
>   "open|filtered" (open or filtered) rather than "open".  The 
> (somewhat
>   rare) ports that actually respond with a UDP packet to the empty
>   probe are considered open.  If version detection is requested, it
>   will be performed on open|filtered ports.  Any that respond 
> to any of
>   the UDP probes will have their status changed to open.  This avoids
>   the false-positive problem where filtered UDP ports appear to be
>   open, leading to terrified newbies thinking their machine is
>   infected by back orifice.
> 
> o Put Nmap on a diet, with changes to the core port scanning routine
>   (ultra_scan) to substantially reduce memory consumption, 
> particularly
>   when tens of thousands of ports are scanned.
> 
> o Added 'leet ASCII art to the configurator!  Note that
>   only people compiling the UNIX source code get this. (ASCII artist
>   unknown).  If you don't like it, feel free to submit your own work.
> 
> o Wrote a new man page from scratch.  It is much more comprehensive
>   (more than twice as long) and (IMHO) better organized than the
>   previous one.  Read it online at http://www.insecure.org/nmap/man/
>   or docs/nmap.1 from the Nmap distribution.  Let me know if you have
>   any ideas for improving it.  Translations to Chinese, French,
>   Japanese, Brazilian Portuguese, Portugal Portuguese, and Romanian
>   can be found on the Nmap docs page at
>   http://www.insecure.org/nmap/docs.html .  More than a dozen other
>   translations are in progress.  The XML source for the man page is
>   distributed with Nmap in docs/nmap-man.xml.  Patches to 
> Nmap that are
>   user-visible should include patches to the man page XML 
> source rather
>   than to the generated Nroff.
> 
> o Integrated all service submissions up to January 2006.  The DB has
>   tripled in size since 3.50 to 3,153 signatures for 381 service
>   protocols.  Those protocols span the gamut from abc, acap, afp, and
>   afs to zebedee, zebra, and zenimaging.  It even covers obscure
>   protocols such as http, ftp, smtp, and ssh :).  Thanks to Version
>   Detection Czar Doug Hoyte for his excellent work on this.  Other
>   great probes and signatures came from Dirk Mueller
>   (mueller(a)kde.org), Lionel Cons (lionel.cons(a)cern.ch), Martin
>   Macok (martin.macok(a)underground.cz), and Bo Jiang
>   (jiangbo(a)brandeis.edu).  Thanks also go to the (literally)
>   thousands of you who submitted service fingerprints.  Keep them
>   coming!
> 
> o Integrated tons of new OS detection fingerprints.  The database grew
>   more than 50% from 1,121 to 1,684 fingerprints.  Notable additions
>   include Mac OS X 10.4 (Tiger), OpenBSD 3.7, FreeBSD 5.4, Windows
>   Server 2003 SP1, Sony AIBO (along with a new "robotic pet" device
>   type category), the latest Linux 2.6 kernels, Cisco routers with IOS
>   12.4, a ton of VoIP devices, Tru64 UNIX 5.1B, new Fortinet
>   firewalls, AIX 5.3, NetBSD 2.0, Nokia IPSO 3.8.X, and Solaris 10.
>   Of course there are also tons of new broadband routers, printers,
>   WAPs and pretty much any other device you can coax an ethernet cable
>   (or wireless card) into!  Much of this OS detecton work was done by
>   Google SoC student Zhao Lei (zhaolei(a)gmail.com).
> 
> o Created a Windows executable installer using the open source NSIS
>   (Nullsoft Scriptable Install System).  It handles Pcap installation,
>   registry performance changes, and adding Nmap to your cmd.exe
>   executable path.  The installer source files are in mswin32/nsis/ .
>   Thanks to Google SoC student Bo Jiang (jiangbo(a)brandeis.edu) for
>   creating the initial version.
> 
> o Added run time interaction as documented at
>   http://www.insecure.org/nmap/man/man-runtime-interaction.html .
>   While Nmap is running, you can now press 'v' to increase verbosity,
>   'd' to increase the debugging level, 'p' to enable packet tracing,
>   or the capital versions (V,D,P) to do the opposite.  Any other key
>   (such as enter) will print out a status message giving the estimated
>   time until scan completion.  Most of this work was done by Paul
>   Tarjan (ptarjan(a)stanford.edu), Andrew Lutomirski
>   (luto(a)myrealbox.com), and Gisle Vanem (giva(a)bgnett.no).
> 
> o Reverse DNS resolution is now done in parallel rather than one at a
>   time.  All scans of large networks (particularly list, ping and
>   just-a-few-ports scans) benefit substantially from this change. The
>   new --system-dns option was added so you can use the (slow) system
>   resolver if you prefer that for some reason.  You can specify a
>   comma separated list of DNS server IP addresses for Nmap to use with
>   the new --dns-servers option.  Otherwise, Nmap looks in
>   /etc/resolve.conf (UNIX) or the system registry (Windows) to obtain
>   the nameservers already configured for your system.  This excellent
>   patch was written by Doug Hoyte (doug(a)hcsw.org).
> 
> o Updated NmapFE to build with GTK2 rather than obsolete GTK1.  Thanks
>   to Priit Laes (amd(a)store20.com), Mike Basinger
>   (dbasinge(a)speakeasy.net) and Meethune Bhowmick
>   (meethune(a)oss-institute.org) for developing the patch.  GTK2 is
>   prettier, more functional, and actually exists on most modern Linux
>   distributions (many of which removed GTK1 long ago).
> 
> o Added the --badsum option, which causes Nmap to use invalid TCP or
>   UDP checksums for packets sent to target hosts. Since virtually all
>   host IP stacks properly drop these packets, any responses received
>   are likely coming from a firewall or IDS that didn't bother to
>   verify the checksum. For more details on this technique, see
>   http://www.phrack.org/phrack/60/p60-0x0c.txt .  The author of that
>   paper, Ed3f (ed3f(a)antifork.org), is also the author of this patch
>   (which I changed it a bit).
> 
> o The 26 Nmap commands that previously included an underscore
>   (--max-rtt-timeout, --send-eth, --host-timeout, etc.) have been
>   renamed to use a hyphen in the preferred format
>   (i.e. --max-rtt-timeout).  Underscores are still supported for
>   backward compatibility.
> 
> o Added --max-retries option for capping the maximum number of
>   retransmissions the port scan engine will do. The value may be as
>   low as 0 (no retransmits).  A low value can increase speed, though
>   at the risk of losing accuracy.  The -T4 option now allows up to 6
>   retries, and -T5 allows 2.  Thanks to Martin Macok
>   (martin.macok(a)underground.cz) for writing the initial patch.
> 
> o Many of the Nmap low-level timing options take a value in
>   milliseconds.  You can now append an 's', 'm', or 'h' to the value
>   to give it in seconds, minutes, or hours instead.  So you 
> can specify a
>   45 minute host timeout with --host-timeout 45m rather than 
> specifying
>   --host-timeout 2700000 and hoping you did the math right 
> and have the 
>   correct number of zeros.  This also now works for the
>   --min-rtt-timeout, --max-rtt-timeout, --initial-rtt-timeout,
>   --scan-delay, and --max-scan-delay options.
> 
> o Wrote a new Nmap compilation, installation, and removal guide, which
>   you can find at http://www.insecure.org/nmap/install/ .
> 
> o Made some changes to allow source port zero scans (-g0).  Nmap used
>   to refuse to do this, but now it just gives a warning that 
> it may not
>   work on all systems.  It seems to work fine on my Linux box.  Thanks
>   to Bill Dale (bill_dale(a)bellsouth.net) for suggesting 
> this feature.
> 
> o Applied some small fixes so that Nmap compiles with Visual C++
>   2005 Express, which is free from Microsoft at
>   http://msdn.microsoft.com/vstudio/express/visualc/ .  Thanks to KX
>   (kxmail(a)gmail.com) and Sina Bahram (sbahram(a)nc.rr.com)
> 
> o Added --thc option (undocumented)
> 
> o Wrote a new "help screen", which you get when running Nmap without
>   arguments.  It is also reproduced in the man page and at
>   http://www.insecure.org/nmap/data/nmap.usage.txt .  I gave up trying
>   to fit it within a 25-line, 80-column terminal window.  It is now 78
>   lines and summarizes all but the most obscure Nmap options.
> 
> o Added OS, device type, and hostname detection using the service
>   detection framework.  Many services print a hostname, which may be
>   different than DNS.  The services often give more away as well.  If
>   Nmap detects IIS, it reports an OS family of "Windows".  If it sees
>   HP JetDirect telnetd, it reports a device type of "printer".  Rather
>   than try to combine TCP/IP stack fingerprinting and service OS
>   fingerprinting, they are both printed.  After all, they could
>   legitimately be different.  An IP that gives a stack fingerprint
>   match of "Linksys WRT54G broadband router" and a service fingerprint
>   of Windows based on Kazaa running is likely a common NAT 
> setup rather
>   than an Nmap mistake.
> 
> o Overhauled the Nmap version detection guide and posted it at
>   http://www.insecure.org/nmap/vscan/ .
> 
> o Service/version detection now handles multiple hosts at once for
>   more efficient and less-intrusive operation.
> 
> o Added "rarity" feature to Nmap version detection.  This causes
>   obscure probes to be skipped when they are unlikely to help.  Each
>   probe now has a "rarity" value.  Probes that detect dozens of
>   services such as GenericLines and GetRequest have rarity values of
>   1, while the WWWOFFLEctrlstat and mydoom probes have a rarity of 9.
>   When interrogating a port, Nmap always tries probes registered to
>   that port number.  So even WWWOFFLEctrlstat will be tried against
>   port 8081 and mydoom will be tried against open ports between 3127
>   and 3198.  If none of the registered ports find a match, Nmap tries
>   probes that have a rarity less than or equal to its current
>   intensity level.  The intensity level defaults to 7 (so that most of
>   the probes are done).  You can set the intensity level with the new
>   --version-intensity option.  Alternatively, you can just use
>   --version-light or --version-all which set the intensity to 2 (only
>   try the most important probes and ones registered to the port
>   number) and 9 (try all probes), respectively.  --version-light is
>   much faster than default version detection, but also a bit less
>   likely to find a match.  This feature was designed and implemented
>   by Doug Hoyte (doug(a)hcsw.org).
> 
> o Added a "fallback" feature to the nmap-service-probes database.
>   This allows a probe to "inherit" match lines from other probes.  It
>   is currently only used for the HTTPOptions, RTSPRequest, and
>   SSLSessionReq probes to inherit all of the match lines from
>   GetRequest.  Some servers don't respond to the Nmap GetRequest (for
>   example because it doesn't include a Host: line) but they do respond
>   to some of those other 3 probes in ways that GetRequest match lines
>   are general enough to match.  The fallback construct allows us to
>   benefit from these matches without repeating hundreds of signatures
>   in the file.  This is another feature designed and implemented
>   by Doug Hoyte (doug(a)hcsw.org).
> 
> o Added "Exclude" directive to nmap-service-probes grammar which
>   causes version detection to skip listed ports.  This is helpful for
>   ports such as 9100.  Some printers simply print any data sent to
>   that port, leading to pages of HTTP requests, SMB queries, X Windows
>   probes, etc.  If you really want to scan all ports, specify
>   --allports.  This patch came from Doug Hoyte (doug(a)hcsw.org).
> 
> o Version detection softmatches (when Nmap determines the service
>   protocol such as smtp but isn't able to determine the app 
> name such as
>   Postfix) can now parse out the normal match line fields such as
>   hostname, device type, and extra info.  For example, we may not know
>   what vendor created an sshd, but we can still parse out the protocol
>   number.  This was a patch from  Doug Hoyte (doug(a)hcsw.org).
> 
> o Fixed a bunch of typos and misspellings throughout the Nmap source
>   code (mostly in comments).  This was a 625-line patch by 
> Saint Xavier
>   (skyxav(a)skynet.be).
> 
> o Added a stripped-down and heavily modified version of Dug Song's
>   libdnet networking library (v. 1.10).  This helps with the new raw
>   ethernet features.  My (extensive) changes are described in
>   libdnet-stripped/NMAP_MODIFICATIONS
> 
> o Updated nmap data files (nmap-mac-prefixes, nmap-protocols,
>   nmap-rpc) with the latest OUIs, IP protocols, and RPC 
> program numbers,
>   respectively.
> 
> o Updated the included libpcap from 0.7.2 to 0.9.3.  This was an
>   attempt to fix an annoying bug, which I then found was actually in
>   my code rather than libpcap :).  Also updated the included GNU
>   shtool (to 2.0.2), LibPCRE (6.4), and the autoconf config.* files
>   (to the latest from their CVS).
> 
> o Nmap now uses (and require) WinPcap 3.1 on Windows.
> 
> o Added MAC address printing.  If Nmap receives packet from a target
>   machine which is on an Ethernet segment directly connected to the
>   scanning machine, Nmap will print out the target MAC address.  Nmap
>   also now contains a database (derived from the official IEEE
>   version) which it uses to determine the vendor name of the target
>   ethernet interface.  Here are examples from normal and XML output
>   (angle brackets replaced with [] for HTML changelog compatibility):
>   MAC Address: 08:00:20:8F:6B:2F (SUN Microsystems)
>   [address addr="00:A0:CC:63:85:4B" vendor="Lite-on 
> Communications" addrtype="mac" /]
> 
> o The official Nmap RPM files are now compiled statically for better
>   compatibility with other systems.  X86_64 (AMD Athlon64/Opteron)
>   binaries are now available in addition to the standard i386.  NmapFE
>   RPMs are no longer distributed by Insecure.Org.
> 
> o Nmap distribution signing has changed. Release files are now signed
>   with a new Nmap Project GPG key (KeyID 6B9355D0).  Learn more at
>   http://www.insecure.org/nmap/install/index.html#inst-integrity
> 
> o Updated random scan (ip_is_reserved()) to reflect the latest IANA
>   assignments.  This to Felix Groebert
>   (felix(a)groebert.org) and Chad Loder (cloder(a)loder.us) for
>   sending these patches.
> 
> o Added the --iflist option, which prints a list of system interfaces
>   and routes detected by Nmap.
> 
> o Removed WinIP library (and all Windows raw sockets code) since MS
>   has gone and broken raw sockets.  Maybe packet receipt via raw
>   sockets will come back at some point.  As part of this removal, the
>   Windows-specific --win_help, --win_list_interfaces, --win_norawsock,
>   --win_forcerawsock, --win_nopcap, --win_nt4route, --win_noiphlpapi,
>   and --win_trace options have been removed.
> 
> o Added new --privileged command-line option and NMAP_PRIVILEGED
>   environmental variable.  Either of these tell Nmap to assume that
>   the user has full privileges to execute raw packet scans, OS
>   detection and the like.  This can be useful when Linux kernel
>   capabilities or other systems are used that allow non-root users to
>   perform raw packet or ethernet frame manipulation.  Without this
>   flag or variable set, Nmap bails on UNIX if geteuid() is
>   nonzero.
> 
> o Changed the RPM spec file so that if you define "static" to 1 (by
>   passing --define "static 1" to rpmbuild), static binaries are built.
> 
> o ultra_scan() now sets pseudo-random ACK values (rather than 0) for
>   any TCP scans in which the initial probe packet has the ACK 
> flag set.
>   This would be the ACK, Xmas, Maimon, and Window scans.
> 
> o Fixed an integer overflow that prevented Nmap from scanning
>   2,147,483,648 hosts in one expression (e.g. 0.0.0.0/1).  Problem
>   noted by Justin Cranford (jcranford(a)n-able.com).  While /1 scans
>   are now possible, don't expect them to finish during your bathroom
>   break.  No matter how constipated you are.
> 
> o Changed from CVS to Subversion source control system (which
>   rocks!). Neither repository is currently public due to security
>   paranoia.
> 
> o Nmap now ships with and installs (in the same directory as other
>   data files such as nmap-os-fingerprints) an XSL stylesheet for
>   rendering the XML output as HTML.  This stylesheet was written by
>   Benjamin Erb ( see http://www.benjamin-erb.de/nmap/ for examples).
>   It supports tables, version detection, color-coded port states, and
>   more.  The XML output has been augmented to include an
>   xml-stylesheet directive pointing to nmap.xsl on the local
>   filesystem.  You can point to a different XSL file by providing the
>   filename or URL to the new --stylesheet argument.  Omit the
>   xml-stylesheet directive entirely by specifying --no-stylesheet.
>   The XML to HTML conversion can be done with an XSLT processor such
>   as Saxon, Sablot, or Xalan, but modern browsers can do this on the
>   fly -- simply load the XML output file in IE or Firefox.It is
>   often more convenient to have the stylesheet loaded from a URL
>   rather than the local filesystem, allowing the XML to be rendered on
>   any machine regardless of whether/where the XSL is installed.  For
>   privacy reasons (avoid loading of an external URL when you view
>   results), Nmap uses the local filesystem by default.  If you would
>   like the latest version of the stylesheet loaded from 
> Insecure.Org when
>   rendering, specify --webxml, which is a shortcut for
>   --stylesheet http://www.insecure.org/nmap/data/nmap.xsl .
> 
> o If a user attempts -PO (the letter O), instead of -P0 (zero), print
>   an error suggesting that the user is a doofus (actually it is a nice
>   message)
> 
> o Upgraded the fragmentation option (-f).  One -f now sets sends
>   fragments with just 8 bytes after the IP header, while -ff sends 16
>   bytes to reduce the number of fragments needed.  You can specify
>   your own fragmentation offset (must be a multiple of 8) with the new
>   --mtu flag.  Don't also specify -f if you use --mtu.  Remember that
>   some systems (such as Linux with connection tracking) will
>   defragment in the kernel anyway -- so test first while sniffing with
>   ethereal.  These changes are from a patch by Martin Macok
>   (martin.macok(a)underground.cz).
> 
> o Nmap now prints the number (and total bytes) of raw IP packets sent
>   and received when it completes, if verbose mode (-v) is 
> enabled.  The
>   report looks like:
>   Nmap finished: 256 IP addresses (3 hosts up) scanned in 
> 30.632 seconds
>                  Raw packets sent: 7727 (303KB) | Rcvd: 6944 (304KB)
> 
> o Added new "closed|filtered" state.  This is used for Idle 
> scan, since
>   that scan method can't distinguish between those two states.  Nmap
>   previously just used "closed", but this is more accurate.
> 
> o Null, FIN, Maimon, and Xmas scans now mark ports as "open|filtered"
>   instead of "open" when they fail to receive any response from the
>   target port.  After all, it could just as easily be 
> filtered as open.
>   This is the same change that was made to UDP scan in 3.70.  Also as
>   with UDP scan, adding version detection (-sV) will change the state
>   from open|filtered to open if it confirms that they really are open.
> 
> o Change IP protocol scan (-sO) so that a response from the target
>   host in any protocol at all will prove that protocol is open.  As
>   before, no response means "open|filtered", an ICMP protocol
>   unreachable means "closed", and most other ICMP error messages mean
>   "filtered".
> 
> o Changed IP protocol scan (-sO) so that it sends valid ICMP, TCP, and
>   UDP headers when scanning protocols 1, 6, and 17, respectively.  An
>   empty IP header is still sent for all other protocols.  This should
>   prevent the error messages such as "sendto in send_ip_packet:
>   sendto(3, packet, 20, 0, 192.31.33.7, 16) => Operation not
>   permitted" that Linux (and perhaps other systems) would give when
>   they try to interpret the raw packet.  This also makes it more
>   likely that these protocols will elicit a response, proving that the
>   protocol is "open".
> 
> o Fixed a memory leak that would generally consume several hundred
>   bytes per down host scanned.  While the effect for most scans is
>   negligible, it was overwhelming when Scott Carlson
>   (Scott.Carlson(a)schwab.com) tried to scan 24 million IPs
>   (10.0.0.0/8).  Thanks to him for reporting the problem.  Also thanks
>   to Valgrind ( http://valgrind.kde.org ) for making it easy to debug.
> 
> o Added --max-scan-delay parameter.  Nmap will sometimes increase the
>   delay itself when it detects many dropped packets.  For example,
>   Solaris systems tend to respond with only one ICMP port unreachable
>   packet per second during a UDP scan.  So Nmap will try to detect
>   this and lower its rate of UDP probes to one per second.  This can
>   provide more accurate results while reducing network congestion, but
>   it can slow the scans down substantially.  By default (with no -T
>   options specified), Nmap allows this delay to grow to one second per
>   probe.  This option allows you to set a lower or higher maximum.
>   The -T4 and -T5 scan modes now limit the maximum scan delay for TCP
>   scans to 10 and 5 ms, respectively.
> 
> o Added --max-hostgroup option which specifies the maximum number of
>   hosts that Nmap is allowed to scan in parallel.
> 
> o Added --min-hostgroup option which specifies the minimum number of
>   hosts that Nmap should scan in parallel (there are some exceptions
>   where Nmap will still scan smaller groups -- see man page).  Of
>   course, Nmap will try to choose efficient values even if you don't
>   specify hostgroup restrictions explicitly.
> 
> o Nmap now estimates completion times for almost all port scan types
>   (any that use ultra_scan()) as well as service scan (version
>   detection).  These are only shown in verbose mode (-v).  On scans
>   that take more than a minute or two, you will see occasional updates
>   like:
>   SYN Stealth Scan Timing: About 30.01% done; ETC: 16:04 
> (0:01:09 remaining)
>   New updates are given if the estimates change significantly.
> 
> o Added --exclude option, which lets you specify a comma-separated
>   list of targets (hosts, ranges, netblocks) that should be excluded
>   from the scan.  This is useful to keep from scanning yourself, your
>   ISP, particularly sensitive hosts, etc.  The new --excludefile reads
>   the list (newline-delimited) from a given file.  All the work was
>   done by Mark-David McLaughlin (mdmcl(a)cisco.com> and William McVey
>   ( wam(a)cisco.com ), who sent me a well-designed and well-tested
>   patch.
> 
> o Nmap now has a "port scan ping" system.  If it has received at least
>   one response from any port on the host, but has not received
>   responses lately (usually due to filtering), Nmap will "ping" that
>   known-good port occasionally to detect latency, packet drop rate,
>   etc.
> 
> o Nmap now wishes itself a happy birthday when run on September 1 in
>   verbose mode!  The first public release was on that date in 1997.
> 
> o The port randomizer now has a bias toward putting
>   commonly-accessible ports (80, 22, etc.) near the beginning of the
>   list.  Getting a response early helps Nmap calculate 
> response times and
>   detect packet loss, so the scan goes faster.
> 
> o Host timeout system (--host-timeout) overhauled to support host
>   parallelization.  Hosts times are tracked separately, so a host that
>   finishes a SYN scan quickly is not penalized for an exceptionally
>   slow host being scanned at the same time.
> 
> o When Nmap has not received any responses from a host, it can now use
>   certain timing values from other hosts from the same scan group.
>   This way Nmap doesn't have to use absolute-worst-case (300bps SLIP
>   link to Uzbekistan) round trip time and latency estimates.
> 
> o Documented the --osscan-limit option, which saves time by skipping
>   OS detection if at least one open and one closed port are 
> not found on
>   the remote hosts.  OS detection is much less reliable against such
>   hosts anyway, and skipping it can save some time.
> 
> o Configure script now detects GNU/k*BSD (whatever that is),
>   thanks to patches from Robert Millan (rmh@xxxxxxxxxx) and Petr
>   Salinger (Petr.Salinger(a)t-systems.cz)
> 
> o Provide limited --packet-trace support for TCP connect() (-sT)
>   scans.
> 
> o Hundreds of other features, bugfixes, and portability
>   enhancements described at 
> http://www.insecure.org/nmap/changelog.html
> 
> MOVING FORWARD:
> 
> With this stable version out of the way, we plan to dive headfirst
> into the next development cycle. Many exciting features are in the
> queue, including a next-generation OS detection system. We also plan
> to launch the 2006 Nmap User Survey in February, to learn what
> features you want most. For the latest news, consider joining the
> 32,000-member low-volume moderated Nmap-hackers list. Subscribe at
> http://cgi.insecure.org/mailman/listinfo/nmap-hackers, or you can read
> the archives at seclists.org. You can subscribe to the (high traffic)
> development list at http://cgi.insecure.org/mailman/listinfo/nmap-dev.
> 
> DOWNLOAD:
> 
> Nmap is available for download from http://www.insecure.org/nmap/ for
> most platforms in source or binary form. Nmap is free, open source
> software (license: http://www.insecure.org/nmap/data/COPYING )
> 
> ACKNOWLEDGEMENTS:
> 
> A popular open source security scanner recently went proprietary,
> complaining that their community never contributes much. We are sorry
> to hear that, but happy to report that the Nmap community is as
> vibrant and productive as ever! We would like to acknowledge and thank
> the many people who contributed ideas and/or code to this release
> (since 3.50). Special thanks go out to Adam Kerrison, Adam Morgan,
> Adriano Monteiro Marques, Alan Bishoff, Alan William Somers, Albert
> Chin, Allison Randal, Alok Tangoankar, Amy Hennings, Anders Thulin,
> Andreia Gaita, Andy Lutomirski, Annalee Newitz, Arturo Buanzo
> Busleiman, Bart Dopheide, Beirne Konarski, Ben Harris, Bill Dale, Bill
> Petersen, Bill Pollock, Bo Jiang, Brian Hatch, Chad Loder, Chris
> Gibson, Christophe, Craig Humphrey, Curtis Doty, Dana Epp, Dirk
> Mueller, Doug Hoyte, Dragos Ruiu, Dug Song, Duilio J. Protti, Eric
> S. Raymond, Felix Gr?bert, Florian Ebner, Fyodor Yarochkin, Ganga
> Bhavani, Gisle Vanem, Glyn Geoghegan, Greg A. Woods, Greg Darke, Greg
> Taleck, Gwenole Beauchesne, HD Moore, Jedi/Sector One, Jeff Nathan,
> Jesse Burns, Jim Carras, Jim Harrison, Jonathan Dieter, Jos? Domingos,
> Justin Cranford, Justin M Cacak, Krok, KX, Lamont Jones, Lance
> Spitzner, Laurent Estieux, Lionel Cons, Lucien Raven, MadHat, Marius
> Strobl, Mark-David McLaughlin, Mark Ruef, Martin Macok, Matthieu
> Verbert, Matt Selsky, Max Schubert, Meethune Bhowmick, Mephisto, Mike
> Basinger, Mike Hatz, Murphy, Netris, Okan Demirmen, Ole Morten
> Grodaas, Oliver Eikemeier, Pascal Trouvin, Paul Tarjan, Petr Salinger,
> Petter Reinholdtsen, pijn trein, Ping Huang, Piotr Sobolewski, Priit
> Laes, Princess Nadia, Raven Alder, Richard Birkett, Richard Moore,
> Robert E. Lee, Rob Foehl, Ronak Sutaria, Royce Williams, Ruediger
> Rissmann, Saint Xavier, Saravanan, Scott Mansfield, Sebastian
> Wolfgarten, Seth Master, Shahid Khan, Simon Burr, Simple Nomad, Sina
> Bahram, Solar Designer, Srivatsan, Stephane Loeuillet, Stephen Bishop,
> Steve Christensen, Steve Martin, Thorsten Holz, Tom Duffy, Tom Rune
> Flo, Tom Sellers, Tony Golding, van Hauser, vlad902, William McVey,
> Zapphire, and Zhao Lei.
> 
> And of course we would also like to thank the thousands of people who
> have submitted OS and service/version fingerprints, as well as
> everyone who has found and reported bugs or suggested features.
> 
> For further information, see http://www.insecure.org/
> 
> 



 




Copyright © Lexa Software, 1996-2009.