Nmap release 4.21Alpha4 is out

Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source (license).

Changelog for 4.21ALPHA4

  • Performed another big OS detection run. The DB has grown almost 10%
    to 417 fingerprints. All submissions up to February 6 have been
    processed. Please keep them coming!
  • Fixed XML output so that the opening tag is printed again. The
    line which prints this was somehow removed when NSE was integrated.
    Thanks to Joshua Abraham for reporting the problem.
  • Fixed a small bug in traceroute progress output which didn’t
    properly indicate completion. [Kris]
  • Fixed a portability problem related to the new traceroute
    functionality so that it compiles on Mac OS X. Thanks to Christophe
    Thil for reporting the problem and sending the 1-line fix.
  • Updated nmap-mac-prefixes to include the latest MAC prefix (OUI)
    data from the IEEE as of March 20, 2007.

Post scriptum

Compliance Mandates

  • Network Discovery :

    PCI DSS 11.2, SOX A13.3, GLBA 16CFR Part 314.4(c), HIPAA 164.308(a)(8), FISMA RA-5


Comments

Related Articles

Enumeration
Footprinting
Network Discovery
Nmap