⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 changelog

📁 nmapp最强的扫描工具
💻
📖 第 1 页 / 共 5 页
字号:
  than fixing it in their own Nmap tree and then applying the patch to  every future version.  On the other hand, they deserve some sort of  "most up-to-date" award.  I stuck Nmap 3.71-PRE1 in the dist  directory for a few people to test, and made no announcement or  direct link.  The FreeBSD crew found it and upgraded anyway :).  The  gcc-workaround patch was apparently submitted to the FreeBSD folks  by Marius Strobl (marius(a)alchemy.franken.de).o Fixed (I hope) an OS detection timing issue which would in some  cases lead to the warning that "insufficient responses for TCP  sequencing (3), OS detection may be less accurate."  Thanks to Adam  Kerrison (adam(a)tideway.com) for reporting the problem.o Modified the warning given when files such as nmap-services exist in  both the compiled in NMAPDATADIR and the current working directory.  That message should now only appear once and is more clear.o Fixed ping scan subsystem to work a little bit better when  --scan_delay (or some of the slower -T templates which include a scan  delay) is specified.  Thanks to Shahid Khan (khan(a)asia.apple.com)  for suggestions.o Taught connect() scan to properly interpret ICMP protocol  unreachable messages.  Thanks to Alan Bishoff  (abishoff(a)arc.nasa.gov) for the report.o Improved the nmapfe.desktop file to better comply with standards.  Thanks to Stephane Loeuillet (stephane.loeuillet(a)tiscali.fr) for  sending the patch.Nmap 3.70o Rewrote core port scanning engine, which is now named ultra_scan().  Improved algorithms make this faster (often dramatically so) in  almost all cases.  Not only is it superior against single hosts, but  ultra_scan() can scan many hosts (sometimes hundreds) in parallel.  This offers many efficiency/speed advantages.  For example, hosts  often limit the ICMP port unreachable packets used by UDP scans to  1/second.  That made those scans extraordinarily slow in previous  versions of Nmap.  But if you are scanning 100 hosts at once,  suddenly you can receive 100 responses per second.  Spreading the  scan amongst hosts is also gentler toward the target hosts.  Nmap  can still scan many ports at the same time, as well.  If you find  cases where ultra_scan is slower or less accurate, please send a  report (including exact command-lines, versions used, and output, if  possible) to Fyodor.o Added --max_hostgroup option which specifies the maximum number of  hosts that Nmap is allowed to scan in parallel.o Added --min_hostgroup option which specifies the minimum number of  hosts that Nmap should scan in parallel (there are some exceptions  where Nmap will still scan smaller groups -- see man page).  Of  course, Nmap will try to choose efficient values even if you don't  specify hostgroup restrictions explicitly.o Rewrote TCP SYN, ACK, Window, and Connect() scans to use  ultra_scan() framework, rather than the old pos_scan().o Rewrote FIN, Xmas, NULL, Maimon, UDP, and IP Protocol scans to use  ultra_scan(), rather than the old super_scan().o Overhauled UDP scan.  Ports that don't respond are now classified as  "open|filtered" (open or filtered) rather than "open".  The (somewhat  rare) ports that actually respond with a UDP packet to the empty  probe are considered open.  If version detection is requested, it  will be performed on open|filtered ports.  Any that respond to any of  the UDP probes will have their status changed to open.  This avoids a  the false-positive problem where filtered UDP ports appear to be  open, leading to terrified newbies thinking their machine is  infected by back orifice.o Nmap now estimates completion times for almost all port scan types  (any that use ultra_scan()) as well as service scan (version  detection).  These are only shown in verbose mode (-v).  On scans  that take more than a minute or two, you will see occasional updates  like:  SYN Stealth Scan Timing: About 30.01% done; ETC: 16:04 (0:01:09 remaining)  New updates are given if the estimates change significantly.o Added --exclude option, which lets you specify a comma-separated  list of targets (hosts, ranges, netblocks) that should be excluded  from the scan.  This is useful to keep from scannig yourself, your  ISP, particularly sensitive hosts, etc.  The new --excludefile reads  the list (newline-delimited) from a given file.  All the work was  done by Mark-David McLaughlin (mdmcl(a)cisco.com> and William McVey  ( wam(a)cisco.com ), who sent me a well-designed and well-tested  patch.o Nmap now has a "port scan ping" system.  If it has received at least  one response from any port on the host, but has not received  responses lately (usually due to filtering), Nmap will "ping" that  known-good port occasionally to detect latency, packet drop rate,  etc.o Service/version detection now handles multiple hosts at once for  more efficient and less-intrusive operation.o Nmap now wishes itself a happy birthday when run on September 1 in  verbose mode!  The first public release was on that date in 1997.o The port randomizer now has a bias toward putting  commonly-accessible ports (80, 22, etc.) near the beginning of the  list.  Getting a response early helps Nmap calculate response times and  detect packet loss, so the scan goes faster.o Host timeout system (--host_timeout) overhauled to support host  parallelization.  Hosts times are tracked separately, so a host that  finishes a SYN scan quickly is not penalized for an exceptionally  slow host being scanned at the same time.o When Nmap has not received any responses from a host, it can now  use certain timing values from other hosts from the same scan  group.  This way Nmap doesn't have to use absolute-worst-case  (300bps SLIP link to Uzbekistan) round trip timeouts and such.o Enabled MAC address reporting when using the Windows version  of Nmap.  Thanks to Andy Lutomirski (luto(a)stanford.edu) for  writing and sending the patch.o Workaround crippled raw sockets on Microsoft Windows XP SP2 scans.  I applied a patch by Andy Lutomirski (luto(a)stanford.edu) which  causes Nmap to default to winpcap sends instead.  The winpcap send  functionality was already there for versions of Windows such as NT and  Win98 that never supported Raw Sockets in the first place.o Changed how Nmap sends Arp requests on Windows to use the iphlpapi  SendARP() function rather than creating it raw and reading the  response from the Windows ARP cache.  This works around a  (reasonable) feature of Windows Firewall which ignored such  unsolicited responses.  The firewall is turned on by default as of  Windows XP SP2.  This change was implemented by Dana Epp  (dana(a)vulscan.com).o Fixed some Windows portability issues discovered by Gisle Vanem  (giva(a)bgnett.no).o Upgraded libpcap from version 0.7.2 to 0.8.3.  This was an attempt  to fix an annoying bug, which I then found was actually in my code  rather than libpcap :).o Removed Ident scan (-I).  It was rarely useful, and the  implementation would have to be rewritten for the new ultra_scan()  system.  If there is significant demand, perhaps I'll put it back in  sometime.o Documented the --osscan_limit option, which saves time by skipping  OS detection if at least one open and one closed port are not found on  the remote hosts.  OS detection is much less reliable against such  hosts anyway, and skipping it can save some time.o Updated nmapfe.desktop file to provide better NmapFE desktop support  under Fedora Core and other systems.  Thanks to Mephisto  (mephisto(a)mephisto.ma.cx) for sending the patch.o Further nmapfe.desktop changes to better fit the freedesktop  standard.  The patch came from Murphy (m3rf(a)swimmingnoodle.com).o Fixed capitalization (with a perl script) of many over-capitalized  vendor names in nmap-mac-prefixes.o Ensured that MAC address vendor names are always escaped in XML  output if they contain illegal characters (particularly '&').  Thanks  to Matthieu Verbert (mve(a)zurich.ibm.com) for the report and a patch.o Changed xmloutputversion in XML output from 1.0 to 1.01 to note that  there was a slight change (which was actually the MAC stuff in 3.55).  Thanks to Lionel CONS (lionel.cons(a)cern.ch) for the suggestion.o Many Windows portability fix and bug fixes, thanks to patch from  Gisle Vanem (giva(a)bgnett.no).  With these changes, he was able to  compile Nmap on Windows using MingW + gcc 3.4 C++ rather than MS  Visual Studio.o Removed (addport) tags from XML output.  They used to provide open  ports as they were discovered, but don't work now that the port  scanners scan many hosts at once.  They did not specify an IP  address.  Of course the appropriate (port) tags are still printed  once scanning of a target is complete.o Configure script now detects GNU/k*BSD systems (whatever those are),  thanks to patch from Robert Millan (rmh@debian.org)o Fixed various crashes and assertion failures related to the new  ultra_scan() system, that were found by Arturo "Buanzo" Busleiman  (buanzo(a)buanzo.com.ar), Eric (catastrophe.net), and Bill Petersen  (bill.petersen(a)alcatel.com).o Fixed some minor memory leaks relating to ping and list scanning as  well as the Nmap output table.  These were found with valgrind (  http://valgrind.kde.org/ ).o Provide limited --packet_trace support for TCP connect() (-sT)  scans.o Fixed compilation on certain Solaris machines thanks to a patch by  Tom Duffy (tduffy(a)sun.com)o Fixed some warnings that crop up when compiling nbase C files with a  C++ compiler.  Thanks to Gisle Vanem (giva(a)bgnett.no) for sending  the patch.o Tweaked the License blurb on source files and in the man page.  It  clarifies some issues and includes a new GPL exception that  explicitly allows linking with the OpenSSL library.  Some people  believe that the GPL and OpenSSL licenses are incompatable without  this special exception.o Fixed some serious runtime portability issues on *BSD systems.  Thanks to Eric (catastrophe.net) for reporting the problem.o Changed the argument parser to better detect bogus arguments to the  -iR option.o Removed a spurious warning message relating to the Windows ARP cache  being empty.  Patch by Gisle Vanem (giva(a)bgnett.no).o Removed some C++-style line comments (//) from nbase, because some C  compilers (particularly on Solaris) barf on those.  Problem reported  by Raju Alluri <Raju.Alluri(a)Sun.COM>Nmap 3.55o Added MAC address printing.  If Nmap receives packet from a target  machine which is on an Ethernet segment directly connected to the  scanning machine, Nmap will print out the target MAC address.  Nmap  also now contains a database (derived from the official IEEE  version) which it uses to determine the vendor name of the target  ethernet interface.  The Windows version of Nmap does not yet have  this capability.  If any Windows developer types are interesting in  adding it, you just need to implement IPisDirectlyConnected() in  tcpip.cc and then please send me the patch.  Here are examples from  normal and XML output (angle brackets replaced with [] for HTML  changelog compatibility):  MAC Address: 08:00:20:8F:6B:2F (SUN Microsystems)  [address addr="00:A0:CC:63:85:4B" vendor="Lite-on Communications" addrtype="mac" /]o Updated the XML DTD to support the newly printed MAC addresses.  Thanks to Thorsten Holz (thorsten.holz(a)mmweg.rwth-aachen.de) for  sending this patch.o Added a bunch of new and fixed service fingerprints for version  detection.  These are from Martin Macok  (martin.macok(a)underground.cz).o Normalized many of the OS names in nmap-os-fingerprints (fixed  capitalization, typos, etc.).  Thanks to Royce Williams  (royce(a)alaska.net) and Ping Huang (pshuang(a)alum.mit.edu) for  sending patches.o Modified the mswine32/nmap_performance.reg Windows registry file to  use an older and more compatible version.  It also now includes the  value "StrictTimeWaitSeqCheck"=dword:00000001 , as suggested by Jim  Harrison (jmharr(a)microsoft.com).  Without that latter value, the  TcpTimedWaitDelay value apparently isn't checked.  Windows users  should apply the new registry changes by clicking on the .reg file.  Or do it manually as described in README-WIN32.  This file is also  now available in the data directory at  http://www.insecure.org/nmap/data/nmap_performance.rego Applied patch from Gisle Vanem (giva(a)bgnett.no) which allows the  Windows version of Nmap to work with WinPCAP 3.1BETA (and probably  future releases).  The Winpcap folks apparently changed the encoding  of adapter names in this release.o Fixed a ping scanning bug that would cause this error message: "nmap:  targets.cc:196: int hostupdate (Target **, Target *, int, int, int,  timeout_info *, timeval *, timeval *, pingtune *, tcpqueryinfo *,  pingstyle): Assertion `pt->down_this_block > 0' failed."  Thanks to

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -