Home page logo
/

Nmap Announce mailing list archives

b3Ta 14 H4z b33n reLEasED!# () $!#@
From: Fyodor <fyodor () dhp com>
Date: Fri, 28 Jan 2000 01:57:34 -0500 (EST)


Hello everyone,

I am pleased to announce that Nmap 2.3BETA14 is now available.  This
release has a few cool changes.  In particular, Peter Kosinar
<goober () gjh sk> performed some cleanup of the output routines and as a
bonus he added skript kiddie output mode!  Try it out by adding 
"-oS - " to your nmap command line:

amy# nmap -sS -oS - -O -v vectra

$TartInG nmap V. 2.3B3tA14 bY fy0D0r () !n$ecure org ( www.ins3cuR3.0Rg/nmap/)
!nt3r3$t|nG pOrtz On v3cTrA.yuma.nEt (192.168.0.5):
P0rt    $tate       PrOtOc0L  $3rv!c3
13      Op3n        tCp       Dayt|m3                 
21      0pen        tcp       ftp                     
22      0pEn        Tcp       $SH                     
23      open        tcp       tEln3t                  
37      OpEn        Tcp       tim3                    
79      op3N        tcp       f!ng3r                  
111     0p3n        TcP       sunrpC                  
113     Open        tcp       auTh                    
513     0peN        Tcp       lOgIn                   
514     OpEn        tcp       $h3ll                   

TcP S3QuEncE PReDiCtion: ClA$s=random p0$|TivE incr3m3nts
                         DIffIculty=24696 (WorthY Challeng3)

s3quEnce numb3rz: 61B825b7 61b83793 61B88114 61b8B073 61B90DB2 61BA306B
R3m0t3 operAtInG sy$t3m gue$z: OpeNBSD 2.2 - 2.3

NMAP run c0mpleteD -- 1 IP adDR3ss (1 h0sT up) $CAnNed in 1 SEC0nd
amy#

This ought to be extremely useful to all the |<-Rad 'l33t people out there
who previously looked down on Nmap due to its consistent capitalization
and spelling.  Maybe I'll make this the default mode <G>.  By the way,
that trick of using '-' for stdout works on the other modes as well
(machine output, etc).

Here are some other changes:

-- Ensured that Nmap always gives up on ident scan after the first
   port attempt finds it to be closed (problem noticed by Matt
   <matt () use net>)

-- Changed strsep's in nmapfe to more portable strtok's (should
   especially help Nmapfe compiles on Solaris)

-- Changed permutation algorithm to make port order and host order
   shuffling more random.

-- Various minor changes and internal code cleanup.

-- Fixed integer overflow that was limiting the max --host_timeout value 
   to about 2,000,000 milliseconds (~1/2 hour).  The limit is now
   about 4,000,000,000 milliseconds (~125 years).  I really hope you don't 
   need more than that :).


For those of you running Linux/x86 w/rpm (www.rpm.org), you can
install/upgrade to the newest version of nmap/nmapfe with these
commands:

rpm -vhU ftp://ftp.server51.freshmeat.net/pub/nmap/nmap-2.3BETA14-1.i386.rpm
rpm -vhU ftp://ftp.server51.freshmeat.net/pub/nmap/nmap-frontend-2.3BETA14-1.i386.rpm

source tarballs and source RPMs are available at:
http://www.insecure.org/nmap or ftp://ftp.server51.freshmeat.net/pub/nmap

Cheers,
Fyodor

--
Fyodor                            'finger pgp () pgp insecure org | pgp -fka'
Frustrated by firewalls?          Try nmap: http://www.insecure.org/nmap/
"I might be able to shoehorn a reference count in on top of the numeric
value by disallowing multiple references on scalars with a numeric value, but
but it wouldn't be as clean. I do occasionally worry about that." -Larry Wall



  By Date           By Thread  

Current thread:
  • b3Ta 14 H4z b33n reLEasED!# () $!#@ Fyodor (Jan 28)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]