Nmap release 4.21Alpha4 is out
Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source (license).
Changelog for 4.21ALPHA4
- Performed another big OS detection run. The DB has grown almost 10%
to 417 fingerprints. All submissions up to February 6 have been
processed. Please keep them coming!
- Fixed XML output so that the opening tag is printed again. The
line which prints this was somehow removed when NSE was integrated.
Thanks to Joshua Abraham for reporting the problem.
- Fixed a small bug in traceroute progress output which didn’t
properly indicate completion. [Kris]
- Fixed a portability problem related to the new traceroute
functionality so that it compiles on Mac OS X. Thanks to Christophe
Thil for reporting the problem and sending the 1-line fix.
- Updated nmap-mac-prefixes to include the latest MAC prefix (OUI)
data from the IEEE as of March 20, 2007.