[ISN] Nmap 3.00 Released!

From: InfoSec News (isnat_private)
Date: Thu Aug 01 2002 - 03:37:44 PDT

  • Next message: InfoSec News: "[ISN] Feds look to secure wireless nets"

    Forwarded from: John Q. Public <tpublicat_private>
    
    ---------- Forwarded message ----------
    Date: Wed, 31 Jul 2002 14:54:32 -0700
    From: Fyodor <fyodorat_private>
    To: nmap-hackersat_private
    Subject: Nmap 3.00 Released!
    
    [ Side note: We had to change IPs due to changing racks at our
      colocation facility.  If you have trouble reaching www.insecure.org,
      try http://64.71.184.53/ ]
    
    -----BEGIN PGP SIGNED MESSAGE-----
    
    Hello everyone,
    
    I am pleased to announce that Nmap version is finally available at
    http://www.insecure.org/nmap/ .  After more than 2 years and 39 beta
    releases, the "stable" 3.00 release has arrived.  And just in time for
    your Blackhat, Defcon, and USENIX Sec shenanigans :).
    
    The changes in 3.00 (over 2.53) are dramatic, and we recommend that
    all current users upgrade.  Here is a list of the most important
    changes (a much more comprehensive list is at
    http://www.insecure.org/nmap/data/CHANGELOG ):
    
    o Added protocol scan (-sP), which determines what IP protocols (TCP,
      IGMP, GRE, UDP, ICMP, etc) are supported by a given host. This uses a
      clever technique designed and implemented by Gerhard Rieger .
    
    o Nmap now recognizes more than 700 operating system versions and
      network devices (printers, webcams, routers, etc) thanks to
      thousands of contributions from the user community! Many operating
      systems were even recognized by Nmap prior to their official
      release. Nmap3 also recognizes 2148 port assignments, 451 SunRPC
      services, and 144 IP protocols.
    
    o Added Idlescan (-sI), which bounces the scan off a "zombie"
      machine. This can be used to bypass certain (poorly configured)
      firewalls and packet filters. In addition, this is the most stealthy
      Nmap scan mode, as no packets are sent to the target from your true
      IP address.
    
    o The base Nmap package now builds and functions under Windows! It is
      distributed in three forms: build-it-yourself source code, a simple
      command-line package, or along with a nice GUI interface (NmapWin)
      and a fancy installer. This is due to the hard work of Ryan Permeh
      (from eEye), Andy Lutomirski, and Jens Vogt.
    
    o Mac OS X is now supported, as well as the latest versions of Linux,
      OpenBSD, Solaris, FreeBSD, and most other UNIX platforms. Nmap has
      also been ported to several handheld devices -- see the Related
      Projects page for further information.
    
    o XML output (-oX) is now available for smooth interoperability
      between Nmap and other tools.
    
    o Added ICMP Timestamp and Netmask ping types (-PP and -PM). These
      (especially timestamp) can be useful against some hosts that do not
      respond to normal ping (-PI) packets. Nmap still allows TCP "ping"
      as well.
    
    o Nmap can now detect the uptime of many hosts when the OS Scan option
      (-O) is used.
    
    o Several new tests have been added to make OS detection more accurate
      and provide more granular version information.
    
    o Removed 128.210.*.* addresses from Nmap man page examples due to
      complaints from Purdue security staff.
    
    o The --data_length option was added, allowing for longer probe
      packets. Among other uses, this defeats certain simplistic IDS
      signatures.
    
    o You can now specify distinct port UDP and TCP port numbers in a
      single scan command using a command like 'nmap -sSU -p
      U:53,111,137,T:21-25,80,139,515,6000,8080 target.com'. See the man
      page for more usage info.
    
    o Added mysterious, undocumented --scanflags and --fuzzy options.
    
    o Nmap now provides IPID as well as TCP ISN sequence
      predictability reports if you use -v and -O.
    
    o SYN scan is now the default scan type for privileged (root)
      users. This is usually offers greater performance while reducing
      network traffic.
    
    o Capitalized all references to God in error messages.
    
    o Added List scan (-sL) which enumerates targets without scanning
      them.
    
    o The Nmap "random IP" scanning mode is now smart enough to skip many
      unallocated netblocks.
    
    o Tons of more minor features, bugfixes, and portability enhancements.
    
    MOVING FORWARD:
    
    With this "stable" version out of the way, I plan to dive headfirst
    into the next development cycle.  Many exciting features are in the
    queue, including IPv6 support, service fingerprinting, improved
    performance against heavily filtered hosts, and more!  Developers (or
    active testers) interested in participating can join the nmap-dev list
    by sending a blank email to nmap-dev-subscribeat_private .  If you
    want to be notified of new releases and important announcements, send
    a blank email to nmap-hackers-subscribeat_private to join that
    list.
    
    DOWNLOAD INFO:
    
    Nmap is available for download from http://www.insecure.org/nmap in
    source or compiled form. Nmap is Free software distributed under the
    terms of the GNU General Public License (GPL).
    
    For the more paranoid (smart) members of the list, here are the md5
    hashes:
    
    2b648bc66f1cedbeed230ef56f6549a8  nmap-3.00.tgz
    cfb513f4083d1de94d2361bd2451f59b  nmap-3.00-1.i386.rpm
    2d04682e972d954061e209865c8bf5af  nmap-3.00-1.src.rpm
    fc4a43dcd2e038acc5f15d534cf8c079  nmap-3.00-win32.zip
    002adb9b0d2e19b007c7de8929cf5e97  nmap-frontend-3.00-1.i386.rpm
    00707cde90a33d0c796489b1b92a74b3  nmapwin_1.3.0.exe
    bf0632817d74d42c8b4fdfe473620c73  nmapwin_1.3.0_src.zip
    
    These release notes should be signed with my PGP key, which is
    available on public keyservers or at
    http://www.insecure.org/fyodor_gpgkey.txt .  The key fingerprint is:
    97 2F 93 AB 9C B0 09 80 D9 51 40 6B B9 BC E1 7E
    
    ACKNOWLEDGEMENTS:
    
    We would like to acknowledge and thank the many people who contributed
    ideas and/or code to this release. Special thanks go to Albert Chin,
    Alex Volkov, Andy Lutomirski, Chad Loder, Colin Phipps, Donna Andert,
    Dragos Ruiu, Eilon Gishri, Evan Sparks, Jeff Nathan, Gerhard Rieger,
    Germano Caronni, Giacomo Cariello, Greg Steuck, H D Moore, Jay Freeman
    (Saurik), Jens Vogt, Kirby Kuehl (Vacuum), Lamont Granquist, LaMont
    Jones, Lance Spitzner, Markus A. Nonym, Martyn Tovey, Matt Connover
    (Shok), Matt Hargett, Matthew Franz, Nicolas Dawson, Pasi Eronen,
    Patrick Mueller, Pieter ten Pierick, Ping Huang, Raymond Mercier,
    Renaud Deraison, Ryan Permeh, Salvatore Sanfilippo (Antirez), Scott
    Renfro, Sebastien Peterson, Takehiro Yonekura, Tim Adam, William
    McVey, William Robertson, Zope Kitten, and everyone I forgot :).
    
    And of course we would also like to thank the thousands of people who
    have submitted OS fingerprints and everyone who has found and reported
    bugs or suggested features.
    
    Cheers,
    Fyodor
    http://www.insecure.org/
    
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.4 (GNU/Linux)
    Comment: For info see http://www.gnupg.org
    
    iQCVAwUBPUhcHM4dPqJTWH2VAQHd/QP7BQmpnMb42K7hlUqWlmfixZLfp9GiP711
    21M+Wi2wLL9BX+vgXYhV9MrP9/EoIcv21hrTim1oMTaKHlDlgtwt+59X44n/jD1K
    1pePXggYLnLUx1BwQwJF0fhvl7P4pRlXfKQ19WXXgVjxEtBBrX3kWGa9SgAVqnQL
    3EK87uFf30Y=
    =le06
    -----END PGP SIGNATURE-----
    
    --------------------------------------------------
    For help using this (nmap-hackers) mailing list, send a blank email to
    nmap-hackers-helpat_private . List run by ezmlm-idx (www.ezmlm.org).
    
    
    
    -
    ISN is currently hosted by Attrition.org
    
    To unsubscribe email majordomoat_private with 'unsubscribe isn'
    in the BODY of the mail.
    



    This archive was generated by hypermail 2b30 : Thu Aug 01 2002 - 06:42:24 PDT