Results 1 to 5 of 5

Thread: Nmap 3.25 Released!

  1. #1
    Senior Member
    Join Date
    Nov 2002
    Posts
    174

    Nmap 3.25 Released!

    Time for all you IDS guys to update signatures. The new version of nmap is out.

    http://www.insecure.org/nmap/nmap_download.html

    I am pleased to announce the Nmap version 3.25 is now available! This
    new several features, including UDP-based "ping" scanning. It also
    offers minor performance advantages over previous versions and
    contains many important bugfixes!

    I have received numerous (daily) problem reports related to compiling
    Nmap 3.20 under Mac OS X. That group is either very big or very
    vocal. Unfortunately, the Sourceforge "compile farm" OS X boxes I was
    using are down for the indeterminate future. So if anyone can give me
    a temporary account, let me know and I'll send you my SSH key. Or, if
    you can fix the compilation problems yourself and send me a patch,
    that would be even better .

    Here are the most important changes in 3.25:

    o I added UDP-based "ping" scanning. The -PU option can take an
    optional portlist like the TCP "ping" options (-PS, -PA), but it
    sends
    a UDP packet to the targets and expects hosts that are up to reply
    with a port unreachable (or possibly a UDP response if the port is
    open). This one is likely to work best against closed ports, since
    many open ports don't respond to empty requests.

    o Fixed (I hope) problem where Nmap would abort, complaining that
    "Assertion `pt->down_this_block > 0' failed". Thanks to
    ray@24hoursecurity.org and mugz@x-mafia.com for reporting and
    helping me debug this problem.

    o Fixed a GCC dependency reported by Ayamura Kikuchi
    (ayamura@keio.net)

    o Fixed an "assertion failure" which would cause Nmap to exit when you
    specify a --max_rtt_timeout below 3000. Thanks to Tammy Rathbun
    (rathbun2@llnl.gov) and Jan Roger Wilkens (jrw@proseq.net) for
    reporting this.

    o Packet receive times are now obtained from libpcap rather than
    simply using the time the packets are passed to Nmap. This should
    improve performance slightly. I was not able to get this to work
    properly on Windows (either pcap or raw) -- join the nmap-dev list
    if you have ideas.

    o Fixed bug that caused Nmap to ignore certain RST responses when you
    do both -PS and -PA.

    o Modified ping scan to work better when many instances of Nmap are
    executed concurrently.

    o I'm now linking directly to the gzip compressed version of Nmap on
    the homepage as well as the .bz2.

    o Fixed a portability problem that caused BSD Make to bail out.

    o Fixed a divide by zero error caused when nonroot users (on UNIX)
    explicitly request ICMP pings (which require root privileges). Now
    it
    prints a warning and uses the normal nonroot TCP connect() ping.
    Jaroslav Sladek (jup@matfyz.cz) found the bug and provided the patch.

    o Made Nmap more tolerant of corrupt nmap-services and nmap-protocols
    files thanks to report & patch sent by Phix (phix@hush.com)

    o Added some more port numbers sent in by Seth Master
    (smaster@stanford.edu). He has been a frequent nmap-services
    contributor in the last couple months.

    o Added --packet_trace support to Windows

    o Removed superfluous "addport" line in the XML output (patch from Max
    Schubert (nmap@webwizarddesign.com)).

    o Merged wintcpip.cc into tcpip.cc to avoid the headache of
    maintaining many nearly-identical functions.

    o Fixed an assertion failure crash related to combining port 0 scans
    and OS scan. Thanks to A.Jones@mvv.de for reporting this.

    o Fixed some compilation problems on systems without IPv6 support --
    patch sent by Jochen Erwied (Jochen.Erwied@mbs-software.info)

    o Applied patch from Jochen Erwied (Jochen.Erwied@mbs-software.info)
    which fixes the format strings used for printing certain timestamps.

    o Upgraded to autoconf 2.57, including the latest
    config.guess/config.sub

    o Renamed configure.ac files to configure.in as recommended by the
    latest autoconf documentation.

    o Changed the wording of NmapFE Gnome entries to better-comply with
    Gnome's Human Interface Guidelines (HIG). Suggested by Axel Krauth
    (krauth@fmi.uni-passau.de)

    For those of you running Linux/x86 w/a recent version of rpm
    (www.rpm.org), you can install/upgrade to the newest version of
    nmap/nmapfe by executing these commands as root:

    rpm -vhU (nmap url)
    where (nmap url) is one (or both) of these:

    http://download.insecure.org/nmap/di....25-1.i386.rpm
    http://download.insecure.org/nmap/di....25-1.i386.rpm

    For the rest of you, source tarballs and source RPMs are always
    available at: http://www.insecure.org/nmap/nmap_download.html

    For the more paranoid (smart) members of the list, here are the md5
    hashes:

    d0b2b9a1f087281d2ae05450e246ba64 nmap-3.25-1.i386.rpm
    b23d50b6713cf85f4e4baf4374bbdb0e nmap-3.25-1.src.rpm
    667106a03d49716954328e60e0f6c007 nmap-3.25.tar.bz2
    73b2c2207ebd774b2a04ac50c781f9db nmap-3.25.tgz
    c7e2184db1f420f9a8ecdd4a3ef12b46 nmap-3.25-win32.zip
    10d43274cd0602f1ab3476dd6ca32d3c nmap-frontend-3.25-1.i386.rpm

    These release notes should be signed with my PGP key, which is
    available at http://www.insecure.org/fyodor_gpgkey.txt .
    The key fingerprint is: 97 2F 93 AB 9C B0 09 80 D9 51 40 6B B9 BC E1 7E

    Cheers,
    Fyodor
    Mike Reilly
    bluebeard96@yahoo.com

  2. #2
    Antionline's Security Dude instronics's Avatar
    Join Date
    Dec 2002
    Posts
    901
    Thx, i will download it to upgrade my version.

    Cheers.
    Ubuntu-: Means in African : "Im too dumb to use Slackware"

  3. #3
    Senior Member
    Join Date
    Apr 2002
    Posts
    634
    Well. It is high time for me to download a recent version. I'm still using an old, slow and buggy one.
    Thanks bluebeard96
    Life is boring. Play NetHack... --more--

  4. #4
    AO Veteran NeuTron's Avatar
    Join Date
    Apr 2003
    Posts
    550
    The new version has some great new features. Thanks man, Im impressed.

  5. #5
    Senior Member
    Join Date
    Nov 2002
    Posts
    174

    3.26 out already!

    To those that just upgraded, I guess they made a couple fixes...

    Hello everyone,

    Hot on the heels of 3.25 comes the new 3.26. It only has 2 major
    changes, but they are important. The bad news is that 3.25 introduced
    a heap corruption bug which could cause intermittent crashes. So all
    3.25 users are urged to upgrade. Pre-3.25 users should upgrade too,
    since 3.25 included so many improvements .

    The good news is that Mac OS X compilation now works on most of the
    machines I tested. But note that you need to type:

    ./configure CPP=/usr/bin/cpp

    instead of the normal "./configure". Thanks to everyone who provided
    or offered shell accounts. Drop me a mail if you still have trouble
    with Mac OS X (or any other system).

    For those of you running Linux/x86 w/a recent version of rpm
    (www.rpm.org), you can install/upgrade to the newest version of
    nmap/nmapfe by executing these commands as root:

    rpm -vhU (nmap url)
    where (nmap url) is one (or both) of these:

    http://download.insecure.org/nmap/di....26-1.i386.rpm
    http://download.insecure.org/nmap/di....26-1.i386.rpm

    For the rest of you, source tarballs and source RPMs are always
    available at: http://www.insecure.org/nmap/nmap_download.html . That
    page also notes sources of binary packages for common operating
    systems.

    For the more paranoid (smart) members of the list, here are the md5
    hashes:

    e97cf8ed95aa0545ac6241dcbfb1c8dc nmap-3.26-1.i386.rpm
    060ea6f6b7e45c10d6319ef58c8f9488 nmap-3.26-1.src.rpm
    1a490c652152f72755947a40921c685b nmap-3.26.tar.bz2
    8c1202cbc18e9071fe968c20ad0047ae nmap-3.26.tgz
    99aff7221ced10237ce852db0a3ceaee nmap-3.26-win32.zip
    b25068336a4b71784a4077e9dbc75c26 nmap-frontend-3.26-1.i386.rpm

    These release notes should be signed with my PGP key, which is
    available at http://www.insecure.org/fyodor_gpgkey.txt .
    The key fingerprint is: 97 2F 93 AB 9C B0 09 80 D9 51 40 6B B9 BC E1 7E

    Cheers,
    Fyodor
    Mike Reilly
    bluebeard96@yahoo.com

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •