Nmap Announce mailing list archives

Nmap 2.3BETA5


From: Fyodor <fyodor () dhp com>
Date: Tue, 7 Sep 1999 05:38:28 -0400 (EDT)


I have released a new beta version of Nmap.  Here is the list of changes
from Beta4:

-- Changed RPC output based on suggestions by David O'Brien
   <obrien () NUXI com> and Lance Spitzner <lance () spitzner net>.  I got
   rid of the "(Non-RPC)" unnecessary clutter which appeared after
   each non RPC port and the "(untested)" that appeard after each
   "filtered" port.

-- Added a ton of new OS fingerprints people submitted.  I had about
   400 in my inbox.  Of course, almost 100 of them were submissions for
   www.windows2000test.com :).

-- Changed the machine parseable output of RPC information to include
   the version information.  If we figured out the RPC info, it is now
   provided as "program-num*lowversion-highversion".  If we didn't get
   the number, but we think the port is RPC, the field simply contains
   "R".  If we believe the port is NOT RPC, then the field contains
   "N".  If the field is empty, we did not RPC scan the port.  Thanks
   to H D Moore <nlog () ings com> for making me aware how much the
   earlier machine parseable RPC logging sucked :).

The new version is, as usual, available at http://www.insecure.org/nmap/

Or you can use these quick links to the various formats:
http://www.insecure.org/nmap/dist/nmap-2.3BETA5.tgz
http://www.insecure.org/nmap/dist/nmap-2.3BETA5-1.i386.rpm
http://www.insecure.org/nmap/dist/nmap-2.3BETA5-1.src.rpm

Cheers,
Fyodor

--
Fyodor                            'finger pgp () pgp insecure org | pgp -fka'
Frustrated by firewalls?          Try nmap: http://www.insecure.org/nmap/
"Girls are different from hacking. You can't just brute force them if all
else fails." --SKiMo, quoted in _Underground_ (good book)



Current thread: