Nmap Development mailing list archives

Re: Nmap 4.22SOC6 Released


From: MadHat Unspecific <madhat () unspecific com>
Date: Wed, 29 Aug 2007 06:58:54 -0500

Fyodor wrote:
<SNIP>
Please give this a try, with a particular emphasis on testing Umit on
Windows and UNIX systems, and also David's new ping scan work
(massping migration).  And then please remember to report your results
to nmap-dev.  Even if everything worked perfectly, we'd love to hear
your thoughts!
<SNIP>

Just some quick feedback.

Installed on my old PowerBook G4 and nmap itself works.  Massping does 
seem to be very fast.  I'll be installing and testing today at work 
scanning large networks and using umit to produce some maps...  I am so 
happy to be back working where I need nmap daily.

I did have some issues with the OS guessing.  As in it didn't get one 
host right of the 6 or so I tried (I'll submit the info later today).
Every scan included  lines that said:
SCRIPT ENGINE: Initiating script scanning.
SCRIPT ENGINE: nselib/ not a directory

SCRIPT ENGINE: Aborting script scan.
 From doing a './configure && make && sudo make install' then running
sudo nmap -T4 -vv -A <host>


Specifics...
[06:36:26 ~]$ uname -a
Darwin hatta-unspecific-com.local 8.10.0 Darwin Kernel Version 8.10.0: 
Wed May 23 16:50:59 PDT 2007; root:xnu-792.21.3~1/RELEASE_PPC Power 
Macintosh powerpc
[06:39:23 ~]$ gcc -v
Reading specs from /usr/lib/gcc/powerpc-apple-darwin8/4.0.0/specs
Configured with: /private/var/tmp/gcc/gcc-4061.obj~8/src/configure 
--disable-checking --prefix=/usr --mandir=/share/man 
--enable-languages=c,objc,c++,obj-c++ 
--program-transform-name=/^[cg][^+.-]*$/s/$/-4.0/ 
--with-gxx-include-dir=/include/gcc/darwin/4.0/c++ 
--build=powerpc-apple-darwin8 --host=powerpc-apple-darwin8 
--target=powerpc-apple-darwin8
Thread model: posix
gcc version 4.0.0 20041026 (Apple Computer, Inc. build 4061)


-- 
MadHat (at) Unspecific.com, C²ISSP
E786 7B30 7534 DCC2 94D5  91DE E922 0B21 9DDC 3E98
gpg --keyserver wwwkeys.us.pgp.net --recv-keys 9DDC3E98

_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://SecLists.Org


Current thread: