Nmap Announce mailing list archives
Nmap 2.3BETA5
From: Fyodor <fyodor () dhp com>
Date: Tue, 7 Sep 1999 05:38:28 -0400 (EDT)
I have released a new beta version of Nmap. Here is the list of changes from Beta4: -- Changed RPC output based on suggestions by David O'Brien <obrien () NUXI com> and Lance Spitzner <lance () spitzner net>. I got rid of the "(Non-RPC)" unnecessary clutter which appeared after each non RPC port and the "(untested)" that appeard after each "filtered" port. -- Added a ton of new OS fingerprints people submitted. I had about 400 in my inbox. Of course, almost 100 of them were submissions for www.windows2000test.com :). -- Changed the machine parseable output of RPC information to include the version information. If we figured out the RPC info, it is now provided as "program-num*lowversion-highversion". If we didn't get the number, but we think the port is RPC, the field simply contains "R". If we believe the port is NOT RPC, then the field contains "N". If the field is empty, we did not RPC scan the port. Thanks to H D Moore <nlog () ings com> for making me aware how much the earlier machine parseable RPC logging sucked :). The new version is, as usual, available at http://www.insecure.org/nmap/ Or you can use these quick links to the various formats: http://www.insecure.org/nmap/dist/nmap-2.3BETA5.tgz http://www.insecure.org/nmap/dist/nmap-2.3BETA5-1.i386.rpm http://www.insecure.org/nmap/dist/nmap-2.3BETA5-1.src.rpm Cheers, Fyodor -- Fyodor 'finger pgp () pgp insecure org | pgp -fka' Frustrated by firewalls? Try nmap: http://www.insecure.org/nmap/ "Girls are different from hacking. You can't just brute force them if all else fails." --SKiMo, quoted in _Underground_ (good book)
Current thread:
- Nmap 2.3BETA5 Fyodor (Sep 07)
- TCP ping question Joe Hacker (Sep 07)