Zenmap

最新版本 Zenmap 7.80

Zenmap 7.80

Zenmap 7.80
Zenmap 是 Nmap 安全掃描程序的官方跨平台 GUI。 Zenmap(網絡映射器)是一個用於網絡發現和安全審計的免費和開源(許可證)實用程序。許多系統和網絡管理員也發現它對於諸如網絡清單,管理服務升級時間表以及監視主機或服務正常運行時間這樣的任務是有用的。

Zenmap 以新穎的方式使用原始 IP 分組來確定網絡上可用的主機,應用程序名稱和版本),主機提供什麼操作系統(和操作系統版本),正在使用什麼類型的數據包過濾器 / 防火牆,以及其他幾十個特性。它被設計用於快速掃描大型網絡,但可以在單個主機上正常工作。所有主要的計算機操作系統都可以運行,並且官方的二進制包可用於 Linux,Windows 和 Mac OS X.



ScreenShot

軟體資訊
檔案版本 Zenmap 7.80

檔案名稱 nmap-7.80-setup.exe
檔案大小 25.68 MB
系統 Windows XP / Vista / Windows 7 / Windows 8 / Windows 10 / XP64 / Vista64 / Windows 7 64 / Windows 8 64 / Windows 10 64
軟體類型 開源軟體
作者 Gordon Lyon
官網 https://www.nmap.org/zenmap/
更新日期 2019-08-12
更新日誌

What's new in this version:

- [Windows] The Npcap Windows packet capturing library (https://npcap.org/) is faster and more stable than ever. Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases: https://nmap.org/npcap/changelog

[NSE] Added 11 NSE scripts, from 8 authors, bringing the total up to 598. The summaries are below:
- broadcast-hid-discoveryd discovers HID devices on a LAN by sending a discoveryd network broadcast probe
- broadcast-jenkins-discover discovers Jenkins servers on a LAN by sending a discovery broadcast probe
- http-hp-ilo-info extracts information from HP Integrated Lights-Out (iLO) servers
- http-sap-netweaver-leak detects SAP Netweaver Portal with the Knowledge Management Unit enabled with anonymous access
- Https-redirect detects HTTP servers that redirect to the same port, but with HTTPS. Some nginx servers do this, which made ssl-* scripts not run properly
- lu-enum enumerates Logical Units (LU) of TN3270E servers
- rdp-ntlm-info extracts Windows domain information from RDP services
- Smb-vuln-webexec checks whether the WebExService is installed and allows code execution
- Smb-webexec-exploit exploits the WebExService to run arbitrary commands with SYSTEM privileges
- ubiquiti-discovery extracts information from the Ubiquiti Discovery service and assists version detection
- vulners queries the Vulners CVE database API using CPE information from Nmap's service and application version detection
- Use pcap_create instead of pcap_live_open in Nmap, and set immediate mode on the pcap descriptor. This solves packet loss problems on Linux and may improve performance on other platforms
- Collected utility functions for string processing into a new library, stringaux.lua
- New rand.lua library uses the best sources of random available on the system to generate random strings
- New library, oops.lua, makes reporting errors easy, with plenty of debugging detail when needed, and no clutter when not
- Collected utility functions for manipulating and searching tables into a new library, tableaux.lua
- New knx.lua library holds common functions and definitions for communicating with KNX/Konnex devices
- The HTTP library now provides transparent support for gzip- encoded response body
- Add AF_VSOCK (Linux VM sockets) functionality to Nsock and Ncat. VM sockets are used for communication between virtual machines and the hypervisor
- [Security][Windows] Address CVE-2019-1552 in OpenSSL by building with the prefix "C:Program Files (x86)NmapOpenSSL". This should prevent unauthorized users from modifying OpenSSL defaults by writing configuration to this directory
- [Security]Reduced LibPCRE resource limits so that version detection can't use as much of the stack. Previously Nmap could crash when run on low-memory systems against target services which are intentionally or accidentally difficult to match. Someone assigned CVE-2018-15173 for this issue
- Deprecate and disable the -PR (ARP ping) host discovery option. ARP ping is already used whenever possible, and the -PR option would not force it to be used in any other case
- [NSE] bin.lua is officially deprecated. Lua 5.3, added 2 years ago in Nmap 7.25BETA2, has native support for binary data packing via string.pack and string.unpack. All existing scripts and libraries have been updated
- [NSE] Completely removed the bit.lua NSE library. All of its functions are replaced by native Lua bitwise operations, except for `arshift` (arithmetic shift) which has been moved to the bits.lua library
- [NSE] The HTTP library is now enforcing a size limit on the received response body. The default limit can be adjusted with a script argument, which applies to all scripts, and can be overridden case-by-case with an HTTP request option. (See https://github.com/nmap/nmap/pull/1571 for details)
- [NSE] CR characters are no longer treated as illegal in script XML output
- Allow resuming nmap scan with lengthy command line
[NSE] Add TLS support to rdp-enum-encryption. Enables determining protocol version against servers that require TLS and lays ground work for some NLA/CredSSP information collection
- [NSE] Address two protocol parsing issues in rdp-enum-encryption and the RDP nse library which broke scanning of Windows XP. Clarify protocol types
- [NSE] Script http-fileupload-exploiter failed to locate its resource file unless executed from a specific working directory
- [NSE]Avoid clobbering the "severity" and "ignore_404" values of fingerprints in http-enum. None of the standard fingerprints uses these fields
- [NSE]Fix a crash caused by a double-free of libssh2 session data when running SSH NSE scripts against non-SSH services
- [NSE]Updates the execution rule of the mongodb scripts to be able to run on alternate ports
- [Ncat]Allow Ncat to connect to servers on port 0, provided that the socket implementation allows this
- Update the included libpcap to 1.9.0
- [NSE]Fix a logic error that resulted in scripts not honoring the smbdomain script-arg when the target provided a domain in the NTLM challenge
- [Nsock]Avoid a crash (Protocol not supported) caused by trying to reconnect with SSLv2 when an error occurs during DTLS connect
- [NSE]Removed OSVDB references from scripts and replaced them with BID references where possible
- [NSE]Updates TN3270.lua and adds argument to disable TN3270E
- RMI parser could crash when encountering invalid input
- Avoid reporting negative latencies due to matching an ARP or ND response to a probe sent after it was recieved
- [Ncat] To avoid confusion and to support non-default proxy ports, option --proxy now requires a literal IPv6 address to be specified using square-bracket notation, such as --proxy [2001:db8::123]:456
- [Ncat] New ncat option provides control over whether proxy destinations are resolved by the remote proxy server or locally, by Ncat itself. See option --proxy-dns
- [NSE] Updated script ftp-syst to prevent potential endless looping
- New service probes and match lines for v1 and v2 of the Ubiquiti Discovery protocol. Devices often leave the related service open and it exposes significant amounts of information as well as the risk of being used as part of a DDoS. New nmap-payload entry for v1 of the protocol
- [NSE] Removed hostmap-ip2hosts.nse as the API has been broken for a while and the service was completely shutdown on Feb 17th, 2019
- [NSE] Adds TN3270E support and additional improvements to tn3270.lua and updates tn3270-screen.nse to display the new setting
- [NSE] Updates product codes and adds a check for response length in enip-info.nse. The script now uses string.unpack
- [Ncat] Temporary RSA keys are now 2048-bit to resolve a compatibility issue with OpenSSL library configured with security level 2, as seen on current Debian or Kali
- [NSE] Fix a crash (double-free) when using SSH scripts against non-SSH services
- [Zenmap] Fix a crash when Nmap executable cannot be found and the system PATH contains non-UTF-8 bytes, such as on Windows

[Zenmap] Fix a crash in results search when using the dir: operator:
- AttributeError: 'SearchDB' object has no attribute 'match_dir'
- [Ncat] Fixed an issue with Ncat -e on Windows that caused early termination of connections
- [NSE] Fix a false-positive in http-phpmyadmin-dir-traversal when the server responds with 200 status to a POST request to any URI
- [NSE] New vulnerability state in vulns.lua, UNKNOWN, is used to indicate that testing could not rule out vulnerability
- [GH#1355] When searching for Lua header files, actually use them where they are found instead of forcing /usr/include
- [NSE] Script traceroute-geolocation no longer crashes when www.GeoPlugin.net returns null coordinates
- Limit verbose -v and debugging -d levels to a maximum of 10. Nmap does not use higher levels internally
- [NSE] tls.lua when creating a client_hello message will now only use a SSLv3 record layer if the protocol version is SSLv3. Some TLS implementations will not handshake with a client offering less than TLSv1.0. Scripts will have to manually fall back to SSLv3 to talk to SSLv3-only servers
- [NSE]Fix a few false-positive conditions in ssl-ccs-injection. TLS implementations that responded with fatal alerts other than "unexpected message" had been falsely marked as vulnerable
- Emergency fix to Nmap's birthday announcement so Nmap wishes itself a "Happy 21st Birthday" rather than "Happy 21th" in verbose mode (-v) on September 1, 2018
- Start host timeout clocks when the first probe is sent to a host, not when the hostgroup is started. Sometimes a host doesn't get probes until late in the hostgroup, increasing the chance it will time out

[NSE] Support for edns-client-subnet (ECS) in dns.lua has been improved by:
- Using ECS code compliant with RFC 7871
- Properly trimming ECS address, as mandated by RFC 7871
- Fixing a bug that prevented using the same ECS option table more than once
- [Ncat] Fixed communication with commands launched with -e or -c on Windows, especially when --ssl is used
- [NSE] Script http-default-accounts can now select more than one fingerprint category. It now also possible to select fingerprints by name to support very specific scanning
- [NSE] Script http-default-accounts was not able to run against more than one target host/port
- [NSE] New script-arg `http.host` allows users to force a particular value for the Host header in all HTTP requests
- [NSE] Use smtp.domain script arg or target's domain name instead of "example.com" in EHLO command used for STARTTLS
- [NSE] Fix brute.lua's BruteSocket wrapper, which was crashing Nmap with an assertion failure due to socket mixup: nmap: nse_nsock.cc:672: int receive_buf(lua_State*, int, lua_KContext): Assertion `lua_gettop(L) == 7' failed
- [NSE] Handle an error condition in smb-vuln-ms17-010 caused by IPS closing the connection
- [Ncat] Fixed literal IPv6 URL format for connecting through HTTP proxies
- [NSE] Updates vendors from ODVA list for enip-info
- [NSE] Add two common error strings that improve MySQL detection by the script http-sql-injection
- [NSE] Fix bug in http-vuln-cve2006-3392 that prevented the script to generate the vulnerability report correctly
- [NSE] Fix bug related to screen rendering in NSE library tn3270. This patch also improves the brute force script tso-brute
- [NSE] Fix SIP, SASL, and HTTP Digest authentication when the algorithm contains lowercase characters
- Nmap could be fooled into ignoring TCP response packets if they used an unknown TCP Option, which would misalign the validation, causing it to fail
- [NSE]The HTTP response parser now tolerates status lines without a reason phrase, which improves compatibility with some HTTP servers

Parser for HTTP Set-Cookie header is now more compliant with RFC 6265:
- Empty attributes are tolerated
- Double quotes in cookie and/or attribute values are treated literally
- Attributes with empty values and value-less attributes are parsed equally
- Attributes named "name" or "value" are ignored
- [NSE] Fix parsing http-grep.match script-arg
- [Zenmap] Avoid a crash when recent_scans.txt cannot be written to
- Fixed --resume when the path to Nmap contains spaces. Reported on Windows by Adriel Desautels
- New service probe and match lines for adb, the Android Debug Bridge, which allows remote code execution and is left enabled by default on many devices

Zenmap 7.80 相關參考資料
Zenmap 7.80 - Npackd

Frequently used scans can be saved as profiles to make them easy to run repeatedly. License: Nmap OpenSource. Version: 7.80. SHA-1 or SHA- ...

https://www.npackd.org

Zenmap Download (2020 Latest) for Windows 10, 8, 7

Zenmap 7.80 LATEST. Requirements: Windows XP / Vista / Windows 7 / Windows 8 / Windows 10 / XP64 / Vista64 / Windows 7 64 / Windows 8 ...

https://www.filehorse.com

Download the Free Nmap Security Scanner for LinuxMac ...

Nmap and Zenmap (the graphical front end) are available in several versions and formats. ... Optional Zenmap GUI (all platforms): zenmap-7.80-1.noarch.rpm

https://nmap.org

Nmap: the Network Mapper - Free Security Scanner

Nmap 7.80 was released for DEFCON 27! ... Release focuses were the Nmap Scripting Engine, performance, Zenmap GUI, and the Nping packet analysis tool.

https://nmap.org

Nmap Change Log

Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, ... [Daniel Miller]; [Zenmap] Fix a crash when Nmap executable cannot be found and the ...

https://nmap.org

Zenmap - Official cross-platform Nmap Security Scanner GUI

Zenmap is the official cross-platform GUI for the Nmap Security Scanner. It is free and runs on Linux, Windows, Mac OS X, etc.

https://nmap.org

Index of dist - Nmap

ncat-7.80-1.x86_64.rpm, 2019-08-10 00:29, 1.2M. [ ], ncat-portable-5.59BETA1.zip, 2013-04-12 ... zenmap-6.20BETA1-1.noarch.rpm, 2013-04-12 11:25, 756K.

https://nmap.org

Download Zenmap 7.80 - Softpedia

Version: Zenmap 7.80; license: GPL; Updated: August 12, 2019; platform: Windows 10 64 bit • Windows 10 • Windows Server 2012 • Windows 2008 • Windows 8 ...

https://www.softpedia.com

Nmap中文网 - Nmap中文手册 Nmap下载

2, zenmap-7.80-1.noarch.rpm, 2019-08-10 00:29, 708K. 3, nping-0.7.80-1.x86_64.rpm, 2019-08-10 00:29, 1.1M. 4, nping-0.7.80-1.i686.rpm, 2019-08-10 00:29 ...

http://www.nmap.com.cn

Zenmap 7.80 軟體資訊介紹 | 電腦資訊007情報站

Zenmap軟體資訊介紹&下載,Zenmap 是Nmap 安全掃描程序的官方跨平台GUI。 Zenmap(網絡映射器)是一個用於網絡發現和安全審計的免費 ...

https://file007.com