Loading...
Friday, June 22, 2012

Nmap 6.01 released

June 23, 2012—The Nmap Project is announced the immediate, free availability of the Nmap Security Scanner version 6.01 from http://nmap.org/

Here are the changes in 6.01:
o [Zenmap] Fixed a hang that would occur on Mac OS X 10.7. A symptom
 of the hang was this message in the system console:
 "Couldn't recognize the image file format for file 
'/Applications/Zenmap.app/Contents/MacOS/../Resources/share/zenmap/pixmaps/radialnet/padlock.png'".
[David Fifield]


o [Zenmap] Fixed a crash that happened when activating the host filter.
     File "zenmapCore\SearchResult.pyo", line 155, in match_os
   KeyError: 'osmatches'
[jah]

o Fixed an error that occurred when scanning certain addresses like
 192.168.0.0 on Windows XP:
   get_srcaddr: can't connect socket: The requested address is not valid in its context.
   nexthost: failed to determine route to 10.80.0.0 [David Fifield]

o Fixed a bug that caused Nmap to fail to find any network interface when
 at least one of them is in the monitor mode. The fix was to define the
 ARP_HRD_IEEE80211_RADIOTAP 802.11 radiotap header identifier in the
 libdnet-stripped code. Network interfaces that are in this mode are used
 by radiotap for 802.11 frame injection and reception. The bug was
 reported by Tom Eichstaedt and Henri Doreau.
 http://seclists.org/nmap-dev/2012/q2/449
 http://seclists.org/nmap-dev/2012/q2/478
 [Djalal Harouni, Henri Doreau]

o Fixed the greppable output of hosts that time-out (when --host-timeout was
 used and the host timed-out after something was received from that host).
 This issue was reported by Matthew Morgan. [jah]

o [Zenmap] Updated the version of Python used to build the Windows
 release from 2.7.1 to 2.7.3 to remove a false-positive security
 alarm flagged by tools such as Secunia PSI. There was a minor
 vulnerability in certain Python27.dll web functionality (which Nmap
 doesn't use anyway) and Secunia was flagging all software which
 includes that version of Python27.dll. This update should prevent
 the false alarm.

Source Code Distribution (in case you wish to compile Nmap yourself)
This is the traditional compile-it-yourself format. The Nmap tarball compiles under Linux, Mac OS X, Windows, and many UNIX platforms (Solaris, Free/Net/OpenBSD, etc.) It includes Zenmap, the GUI frontend. Nmap is now offered in bzip2 format as well as traditional gzip.
Detailed Linux/BSD/Solaris compilation instructions and options are provided here, though this usually does the trick:
bzip2 -cd nmap-6.01.tar.bz2 | tar xvf -
cd nmap-6.01
./configure
make
su root
make install
Most Windows users install with our Windows executable installer, but we also provide Windows source code compilation instructions.
Most Mac OS X users install with our Mac installer, but we also provide Mac OS X source code compilation instructions.
If you are compiling Nmap anyway, you might prefer to get the very latest code from our SVN source code repository rather than downloading a tarball here.
Latest Nmap release tarball: nmap-6.01.tar.bz2 (or gzip compressed)

Our previous post regarding nmap 6 -

For more information -
Detailed Changes in Nmap-
Download -

0 comments:

Post a Comment

 
TOP