Nmap & Zenmap v4.52 released

Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source (license).

Nmap Changelog for this release :

  • Fixed Nmap Winpcap installer to use CurrentVersion registry key on Windows rather than VersionNumber to more reliably detect Vista machines. This should prevent the XP version of Packet.dll from being installed on Vista. [Rob Nicholls]
  • The Nmap Scripting Engine (NSE) now supports run-time interaction and the Nmap —host-timeout option. [Doug]
  • Added nmap.fetchfile() function for scripts so they can easily find Nmap’s nmap-* data files (such as the OS/version detection DBs, port number mapping, etc.) [Kris]
  • Updated rpcinfo.nse to use nmap.fetchfile() to read from nmap-rpc instead of having a huge table of RPC numbers. This reduced the script’s size by nearly 75%. [Kris]
  • Fixed multiple NSE scripts that weren’t always properly closing their sockets. The error message was: "bad argument #1 to ’close’ (nsock expected, got no value)" [Kris]
  • Added a new version detection probe for the Trend Micro OfficeScan product line. [Tom Sellers]

Post scriptum

Compliance Mandates

  • Network Discovery :

    PCI DSS 11.2, SOX A13.3, GLBA 16CFR Part 314.4(c), HIPAA 164.308(a)(8), FISMA RA-5


Comments

Related Articles

Information Gathering
Network Discovery
Nmap