Project Release Information
Nping packet probing and analysis tool has been added. Nmap Scripting Engine has been enhanced, and many new NSE scripts and libraries have been added (the new totals are 177 and 54, respectively). Many OS fingerprints and version detection signatures have been added, bringing the totals to 2,982 and 7,319, respectively. Zenmap GUI has been made faster when handling giant enterprise networks, and some new features have been added to it (script selection interface, printing support, and more).
320 important changes were made, including the Zenmap cross-platform GUI, a 2nd generation OS detection system, the Nmap Scripting Engine, a rewritten host discovery system, performance optimizations, advanced traceroute functionality, TCP and IP options support, and nearly 1500 new version detection signatures. It is recommended that all current users upgrade.
This stable release incorporates many improvements
from 13 development releases over the last 6
months. These include a second generation OS
detection system that is faster and more accurate,
support for IP options (source routing, record
route, etc.), an --open option for showing only
open ports, version detection database updates,
more detailed XML output, and dozens of bugfixes.
This release includes dozens of more detailed SSH version detection signatures. It also detects the Nessus daemon. Several bugs were fixed, including Solaris and HP-UX compilation problems.
This release is a grab bag of new features and bugfixes. 300 signatures were added to the version detection database, bringing the total up to 3,441 (representing 401 protocols). Output was streamlined to allow multiple ignored port states so your console isn't flooded when a host has thousands of ports in both the filtered and closed states. ICMP rate limiting detection was optimized for faster scanning. There were also dozens of other bugfixes and minor feature additions.
Nmap ("Network Mapper") is a utility for network exploration, administration, and security auditing. It uses IP packets in novel ways to determine which hosts are available online (host discovery), which TCP/UDP ports are open (port scanning), and what applications and services are listening on each port (version detection). It can also identify remote host OS and device types via TCP/IP fingerprinting. Nmap offers flexible target and port specifications, decoy/stealth scanning for firewall and IDS evasion, and highly optimized timing algorithms for fast scanning.