Home page logo
/

nmap-dev logo Nmap Development mailing list archives

Nmap-dev-only release: Nmap 3.10ALPHA1
From: Fyodor <fyodor () insecure org>
Date: Wed, 28 Aug 2002 01:18:13 -0700

Hey Guys,

I just put Nmap 3.10ALPHA1 up at the following locations:

http://download.insecure.org/nmap/dist/nmap-3.10ALPHA1.tgz
http://download.insecure.org/nmap/dist/nmap-3.10ALPHA1-1.src.rpm
http://download.insecure.org/nmap/dist/nmap-3.10ALPHA1-1.i386.rpm
http://download.insecure.org/nmap/dist/nmap-3.10ALPHA1-win32.zip

This version is labeled "alpha" since it has undergone massive code
restructuring to convert it to C++ and add IPv6 support.  So I am only
sending it to Nmap-dev.  Give it a try and let me know how it goes.  I
haven't tested it on many platforms yet, but it compiles on Linux and
Windows, so the others shouldn't require too much tweaking.  Windows
users: see README-WIN32 for new compilation instructions.  If it
doesn't compile on your platform or you find bugs, patches are welcome
:).

The IPv6 support is currently limited to the most important options
such as -sT.  I may add raw ICMP6 if there is demand.  The protocol is
actually pretty fun!  Not only do I feel like a king with my own /64
allocation ( 18446744073709551616 addresses!), but it can be useful
for bypassing certain firewalls.  Check out this host that has a bunch
of filtered IPv4 ports, but is wide open via IPv6.  Pay special
attention to port 111 (SunRPC).

nmap www.kame.net

Starting nmap V. 3.10ALPHA1 ( www.insecure.org/nmap/ )
Interesting ports on kame220.kame.net (203.178.141.220):
(The 1585 ports scanned but not shown below are in state: closed)
Port       State       Service
19/tcp     filtered    chargen
21/tcp     open        ftp
22/tcp     open        ssh
53/tcp     open        domain
80/tcp     open        http
111/tcp    filtered    sunrpc
137/tcp    filtered    netbios-ns
138/tcp    filtered    netbios-dgm
139/tcp    filtered    netbios-ssn
513/tcp    filtered    login
514/tcp    filtered    shell
2049/tcp   filtered    nfs
2401/tcp   open        cvspserver
5999/tcp   open        ncd-conf
7597/tcp   filtered    qaz
31337/tcp  filtered    Elite

Nmap run completed -- 1 IP address (1 host up) scanned in 34 seconds

nmap -6 www.kame.net

Starting nmap V. 3.10ALPHA1 ( www.insecure.org/nmap/ )
Interesting ports on 3ffe:501:4819:2000:210:f3ff:fe03:4d0:
(The 1595 ports scanned but not shown below are in state: closed)
Port       State       Service
21/tcp     open        ftp
22/tcp     open        ssh
53/tcp     open        domain
80/tcp     open        http
111/tcp    open        sunrpc
2401/tcp   open        cvspserver

Nmap run completed -- 1 IP address (1 host up) scanned in 19 seconds

Note that this may have changed, since I notified the Kame folks a few
days ago.  However, I'm sure plenty of others are making this mistake!

OK, here are the actual CHANGELOG entries:

o IPv6 is now supported for TCP scan (-sT), connect()-style ping scan
  (-sP), and list scan (-sL)!  Just specify the -6 option and the IPv6
  numbers or DNS names.  Netmask notation is not currently supported
  -- I'm not sure how useful it is for IPv6, where even petty end
  users may be allocated trillions of addresses (/80).  If you need
  one of the scan types that hasn't been ported yet, give Sebastien
  Peterson's patch a try at http://nmap6.sourceforge.net/ .  If there
  is demand, I may integrate more of that into Nmap.

o Major code restructing, which included conversion to C++ -- so
  you'll need g++ or another C++ compiler.  I accidently let a C++
  requirement slip in a while back and found that almost everyone has
  such a compiler.  Windows (VC++) users: see the README-WIN32 for new
  compilation instructions.

o Applied patch from Axel Nennker (Axel.Nennker () t-systems com) which
  adds a --without-nmapfe option to the configure script.  This si
  useful if your system doesn't have the proper libraries (eg GTK) or
  if you think GUIs are for sissies :).

o Removed arbitrary max_parallelism (-M) limitations, as suggested by
  William McVey ( wam () cisco com ).

o Added DEC OSF to the platforms that require the BSDFIX() macro due
  to taking ip length and offset fields in host rather than network
  byte order.  Suggested by Dean Bennett (deanb () gbtn net)

o Fixed an debug statement C ambiguity discovered by Kronos
  (kronos () kronoz cjb net)

Cheers,
Fyodor

---------------------------------------------------------------------
For help using this (nmap-dev) mailing list, send a blank email to 
nmap-dev-help () insecure org . List run by ezmlm-idx (www.ezmlm.org).



  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]