What's new in this version: - [Windows] Upgraded Npcap (our Windows raw packet capturing and transmission driver) from version 1.00 to the latest version 1.50. - [Windows] Thanks to the Npcap 1.50 upgrade, Nmap now works on the Windows ARM architecture so you can run it on lightweight and power-efficient tablets like the Microsoft Surface Pro X and Samsung Galaxy Book Go. More ARM devices are on the way along with the upcoming Windows 11 release. - [Windows] Updated our Windows builds to Visual Studio 2019, Windows 10 SDK, and the UCRT. This prevents Nmap from working on Windows Vista and earlier, but they can still use older versions of Nmap on their ancient operating system. - New Nmap option --unique will prevent Nmap from scanning the same IP address twice, which can happen when different names resolve to the same address. - [NSE][GH#1691] TLS 1.3 now supported by most scripts for which it is relevant, such as ssl-enum-ciphers. Some functions like ssl tunnel connections and certificate parsing will require OpenSSL 1.1.1 or later to fully support TLS 1.3.
[NSE] Added 3 NSE scripts, from 4 authors, bringing the total up to 604!, and the summaries are below: - [GH#2201] nbns-interfaces queries NetBIOS name service (NBNS) to gather IP addresses of the target's network interfaces - [GH#711] openflow-info gathers preferred and supported protocol versions from OpenFlow devices - port-states prints a list of ports that were found in each state, including states that were summarized as "Not shown: X closed ports" - [GH#2350] Upgraded OpenSSL to version 1.1.1k. This addresses some CVE's which don't affect Nmap in a material way. - Removed support for the ancient WinPcap library since we already include our own Npcap library supporting the same API. WinPcap was abandoned years ago and it's official download page says that "WE RECOMMEND USING Npcap INSTEAD" for security, stability, compatibility, and support reasons. - [GH#2257] Fix an issue in addrset matching that was causing all targets to be excluded if the --excludefile listed a CIDR range that contains an earlier, smaller CIDR range. - Upgrade the Windows NSIS installer to use the latest NSIS 3 (version 3.07) instead of the previous NSIS 2 generation. - Setting --host-timeout=0 will disable the host timeout, which is set by -T5 to 15 minutes. Earlier versions of Nmap require the user to specify a very long timeout instead.
Several changes to UDP payloads to improve accuracy: - [GH#2269] Fix an issue with -sU where payload data went out-of-scope before it was used, causing corrupted payloads to be sent. - Nmap's retransmission limits were preventing some UDP payloads from being tried with -sU and -PU. Now, Nmap sends each payload for a particular port at the same time without delay.
New UDP payloads: - [GH#1279] TS3INIT1 for UDP 3389 - [GH#1895] DTLS for UDP 3391 (RD Gateway)
[NSE][GH#2208][GH#2203] SMB2 dialect handling has been redesigned. Visible changes include: - Notable improvement in speed of script smb-protocols and others - Some SMB scripts are no longer using a hardcoded dialect, improving target interoperability - Dialect names are aligned with Microsoft, such as 3.0.2, instead of 3.02
Improvements to Nmap's XML output: - If a host times out, the XML <host> element will have the attribute timedout="true" and the host's timing info (srtt etc.) will still be printed. - The "extrareasons" element now includes a list of port numbers for each "ignored" state. The "All X ports" and "Not shown:" lines in normal output have been changed slightly to provide more detail. - [NSE][GH#2237] Prevent the ssl-* NSE scripts from probing ports that were excluded from version scan, usually 9100-9107, since JetDirect will print anything sent to these ports. - [GH#2206] Nmap no longer produces cryptic message "Failed to convert source address to presentation format" when unable to find useable route to the target. - [Ncat][GH#2202] Use safety-checked versions of FD_* macros to abort early if number of connections exceeds FD_SETSIZE. - [Ncat] Connections proxied via SOCKS4/SOCKS5 were intermittently dropping server data sent right after the connection got established, such as port banners. - [Ncat][GH#2149] Fixed a bug in proxy connect mode which would close the connection as soon as it was opened in Nmap 7.90 and 7.91. - [NSE][GH#2175] Fixed NSE so it will not consolidate all port script output for targets which share an IP (e.g. HTTP vhosts) under one target. - [Zenmap][GH#2157] Fixed an issue where a failure to execute Nmap would result in a Zenmap crash with "TypeError: coercing to Unicode" exception. - Nmap no longer considers an ICMP Host Unreachable as confirmation that a target is down, in accordance with RFC 1122 which says these errors may be transient. Instead, the probe will be destroyed and other probes used to determine aliveness. - [Ncat][GH#2154] Ncat no longer crashes when used with Unix domain sockets. - [Ncat][GH#2167][GH#2168] Ncat is now again generating certificates with the duration of one year. Due to a bug, recent versions of Ncat were using only one minute. - [NSE][GH#2281] URL/percent-encoding is now using uppercase hex digits to align with RFC 3986, section 2.1, and to improve compatibility with some real-world web servers. - [NSE][GH#2174] Script hostmap-crtsh got improved in several ways. The most visible are that certificate SANs are properly split apart and that identities that are syntactically incorrect to be hostnames are now ignored. - [NSE] Loading of a Nikto database failed if the file was referenced relative to the Nmap directory - [GH#2199] Updated Nmap's NPSL license to rewrite a poorly-worded clause abiyt "proprietary software companies". As described on that page, we are also still offering Nmap 7.90, 7.91, and 7.92 under the previous Nmap 7.80 license. Finally, we still offer the Nmap OEM program for companies who want a non-copyleft license allowing them to redistribute Nmap with their products. - [NSE] Script smb2-vuln-uptime no longer reports false positives when the target does not provide its boot time. - [NSE][GH#2197] Client packets composed by the DHCP library will now contain option 51 (IP address lease time) only when requested. - [NSE][GH#2192] XML decoding in library citrixxml no longer crashes when encountering a character reference with codepoint greater than 255. (These references are now left unmodified.) - [NSE] Script mysql-audit now defaults to the bundled mysql-cis.audit for the audit rule base. - [NSE][GH#1473] It is now possible to control whether the SNMP library uses v1 (default) or v2c by setting script argument snmp.version.
Zenmap 7.92 相關參考資料
Download the Free Nmap Security Scanner for LinuxMac ...
Official Download site for the Free Nmap Security Scanner. Helps with network security, administration, and general hacking.
https://nmap.org
Kali Linux安装zenmap详解原创
2022年5月29日 — 在最新版本的Kali Linux中,已经不自动安装zenmap了,如果想要使用的话,我们就必须进行安装。 我们可以前往NMAP官网下载zenmap的安装包,下载页面如下所 ...
https://blog.csdn.net
Nmap 7.92 新版本已經發布,這是它的新聞
2021年8月9日 — Nmap 7.92的主要新功能 · 增加了“--unique”選項,避免在不同域名解析為同一個IP時多次掃描同一個IP地址。 · 包含3 個新的NSE 腳本使用Nmap 自動執行各種 ...
https://www.linuxadictos.com
Nmap Release archive
zenmap-7.92-1.noarch.rpm, 2021-08-07 17:23, 703K. [ ], nping-0.7.92-1.x86_64.rpm, 2021-08-07 17:23, 1.4M. [ ], nmap-7.92-1.x86_64.rpm, 2021-08-07 17:23, 7.1M. [ ] ...
https://nmap.org
Nmap中文手册 Nmap下载: Nmap中文网
Nmap是一个网络连接端扫描软件,用来扫描网上电脑开放的网络连接端。确定哪些服务运行在哪些连接端,并且推断计算机运行哪个操作系统(这是亦称 fingerprinting)。
http://www.nmap.com.cn
Zenmap - Official cross-platform Nmap Security Scanner GUI
Zenmap is the official cross-platform GUI for the Nmap Security Scanner. It is free and runs on Linux, Windows, Mac OS X, etc.
https://nmap.org
Zenmap 7.92
2021年8月8日 — free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users.
https://www.npackd.org
Zenmap 7.92 • Debian package and required ...
Zenmap 7.92 • Debian package and required dependencies for Jammy/Bullseye/Kali (AMD64) - GitHub - DesktopECHO/Zenmap: Zenmap 7.92 • Debian package and ...
https://github.com
在新版Kali Linux 中安装Zenmap的详细安装教程,过程详解
2023年2月15日 — 第一步:使用需要安装zenmap的kali Linux的浏览器访问nmap的官网https://nmap.org · 第二步:新版kali Linux不支持rpm命令,需要安装rpm格式转化工具 ...
https://bbs.huaweicloud.com
|