Nmap Announce mailing list archives
b3Ta 14 H4z b33n reLEasED!#@$!#@
From: Fyodor <fyodor () dhp com>
Date: Fri, 28 Jan 2000 01:57:34 -0500 (EST)
Hello everyone, I am pleased to announce that Nmap 2.3BETA14 is now available. This release has a few cool changes. In particular, Peter Kosinar <goober () gjh sk> performed some cleanup of the output routines and as a bonus he added skript kiddie output mode! Try it out by adding "-oS - " to your nmap command line: amy# nmap -sS -oS - -O -v vectra $TartInG nmap V. 2.3B3tA14 bY fy0D0r@!n$ecure.org ( www.ins3cuR3.0Rg/nmap/) !nt3r3$t|nG pOrtz On v3cTrA.yuma.nEt (192.168.0.5): P0rt $tate PrOtOc0L $3rv!c3 13 Op3n tCp Dayt|m3 21 0pen tcp ftp 22 0pEn Tcp $SH 23 open tcp tEln3t 37 OpEn Tcp tim3 79 op3N tcp f!ng3r 111 0p3n TcP sunrpC 113 Open tcp auTh 513 0peN Tcp lOgIn 514 OpEn tcp $h3ll TcP S3QuEncE PReDiCtion: ClA$s=random p0$|TivE incr3m3nts DIffIculty=24696 (WorthY Challeng3) s3quEnce numb3rz: 61B825b7 61b83793 61B88114 61b8B073 61B90DB2 61BA306B R3m0t3 operAtInG sy$t3m gue$z: OpeNBSD 2.2 - 2.3 NMAP run c0mpleteD -- 1 IP adDR3ss (1 h0sT up) $CAnNed in 1 SEC0nd amy# This ought to be extremely useful to all the |<-Rad 'l33t people out there who previously looked down on Nmap due to its consistent capitalization and spelling. Maybe I'll make this the default mode <G>. By the way, that trick of using '-' for stdout works on the other modes as well (machine output, etc). Here are some other changes: -- Ensured that Nmap always gives up on ident scan after the first port attempt finds it to be closed (problem noticed by Matt <matt () use net>) -- Changed strsep's in nmapfe to more portable strtok's (should especially help Nmapfe compiles on Solaris) -- Changed permutation algorithm to make port order and host order shuffling more random. -- Various minor changes and internal code cleanup. -- Fixed integer overflow that was limiting the max --host_timeout value to about 2,000,000 milliseconds (~1/2 hour). The limit is now about 4,000,000,000 milliseconds (~125 years). I really hope you don't need more than that :). For those of you running Linux/x86 w/rpm (www.rpm.org), you can install/upgrade to the newest version of nmap/nmapfe with these commands: rpm -vhU ftp://ftp.server51.freshmeat.net/pub/nmap/nmap-2.3BETA14-1.i386.rpm rpm -vhU ftp://ftp.server51.freshmeat.net/pub/nmap/nmap-frontend-2.3BETA14-1.i386.rpm source tarballs and source RPMs are available at: http://www.insecure.org/nmap or ftp://ftp.server51.freshmeat.net/pub/nmap Cheers, Fyodor -- Fyodor 'finger pgp () pgp insecure org | pgp -fka' Frustrated by firewalls? Try nmap: http://www.insecure.org/nmap/ "I might be able to shoehorn a reference count in on top of the numeric value by disallowing multiple references on scalars with a numeric value, but but it wouldn't be as clean. I do occasionally worry about that." -Larry Wall
Current thread:
- b3Ta 14 H4z b33n reLEasED!#@$!#@ Fyodor (Jan 27)