Nmap 6 Released Featuring Improved Scripting, Full IPv6 Support 45
First time accepted submitter Chankey Pathak writes "The Nmap Project is pleased to announce the immediate, free availability of the Nmap Security Scanner version 6.00 from http://nmap.org/. It is the product of almost three years of work, 3,924 code commits, and more than a dozen point releases since the big Nmap 5 release in July 2009. Nmap 6 includes a more powerful Nmap Scripting Engine, 289 new scripts, better web scanning, full IPv6 support, the Nping packet prober, faster scans, and much more!"
Machine learning (AI) for the IPv6 OS detection (Score:4, Interesting)
It's great to see the use of machine learning for the OS clasification / fingerprinting with IPv6. If this works out well I'd love to see a 3rd-generation IPv4 OS detection added using similar techniques. See http://nmap.org/book/osdetect-guess.html#osdetect-guess-ipv6 [nmap.org]
Re: (Score:3, Informative)
Because:
1. Giving credit who submitted a story has been the way Slashdot has worked since last century.
2. Users are free to put whatever web page in as their home page, whether it be a replacement for a finger profile, or Last Measure, or their own blog or whatever.
3. Anonymous Cowards are 99.997% morons.
Better Details (Score:5, Informative)
Here's a better detail of what's up, even more following the link.
1. NSE Enhanced
The script count has grown from 59 in Nmap 5 to 348 in Nmap 6, and all of them are documented and categorized in our NSE Documentation Portal. The underlying NSE infrastructure has improved dramatically as well.
3. Full IPv6 Support
Basic support isn't enough, so we spent many months ensuring that Nmap version 6 contains full support for IP version 6. And we released it just in time for the World IPv6 Launch.
We've created a new IPv6 OS detection system, advanced host discovery, raw-packet IPv6 port scanning, and many NSE scripts for IPv6-related protocols. It's easy to use too—just specify the -6 argument along with IPv6 target IP addresses or DNS records. In addition, all of our web sites are now accessible via IPv6. For example, Nmap.org can be found at 2600:3c01::f03c:91ff:fe96:967c.
4. New Nping Tool
The newest member of the Nmap suite of networking and security tools is Nping, an open source tool for network packet generation, response analysis and response time measurement. Nping can generate network packets for a wide range of protocols, allowing full control over protocol headers. While Nping can be used as a simple ping utility to detect active hosts, it can also be used as a raw packet generator for network stack stress testing, ARP poisoning, Denial of Service attacks, route tracing, etc. Nping's novel echo mode lets users see how packets change in transit between the source and destination hosts. That's a great way to understand firewall rules, detect packet corruption, and more.
5. Better Zenmap GUI & results viewer
While Nmap started out as a command-line tool and many (possibly most) users still use it that way, we've also developed an enhanced GUI and results viewer named Zenmap. One addition since Nmap 5 is a “filter hosts” feature which allows you to see only the hosts which match your criteria (e.g. Linux boxes, hosts running Apache, etc.) We've also localized the GUI to support five languages besides English. A new script selection interface helps you find and execute Nmap NSE scripts. It even tells you what arguments each script supports.
6. Faster scans
Since Nmap 5 we've rewritten the traceroute system for higher performance and increased the allowed parallelism of the Nmap Scripting Engine and version detection subsystems. We also performed an intense memory audit which reduced peak consumption during our benchmark scan by 90%. We made many improvements to Zenmap data structures and algorithms as well so that it can now handle large enterprise scans with ease.
Re: (Score:2)
Do we need to rewrite The Matrix Reloaded then?
The Wachowsky Brothers
Re: (Score:2)
Yes, but not for this reason.
Filmgoing Public
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
I think you would need a much smaller /. UID in order to get that joke.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Yes that makes it easy to rememb... oh screw that!
Thee will be a lot of 2600 prefixes, though, considering usual allocations for people with "sites" and preexisting IPV4 allocations are /48 or /44.
BT5r2 doesn't have deb build yet - it's here (Score:3, Informative)
I've compiled the sources earlier this morning into deb packages for those that want to play with it without building from source (building from source will confuse the system and you might not get updates). Both i386 and amd64 versions working on BT5 r2 here. http://www.phillips321.co.uk/2012/05/22/creating-a-debian-package-from-source-checkinstall/ [phillips321.co.uk]
Re: (Score:1)
Re:My eyes! The goggles do nothing! (Score:4, Interesting)
If this is the quality of their HTML and CSS code, that doesn't give me much optimism about the quality of their C code.
Why? Just because they didn't spend time making it look pretty for you?
Re: (Score:2)
I never did get an answer to ... (Score:4, Interesting)
... the question of whether or not Nmap could be used to sniff a network before it is configured with an IP address (DHCP can, so mechanisms to do so must exist, like maybe raw interface access), to do things like silently watch what other traffic is taking place to make smart guess as to which LAN a given interface is physically connected to. This information could then be used to select the IP address it is statically configured to use for a given subnet (but without specific interface information since that can change for many reasons).
Re:I never did get an answer to ... (Score:5, Informative)
Wireshark can do this.
Re:I never did get an answer to ... (Score:4, Interesting)
Well, neither libpcap nor tcpdump can do it either, they don't come with the network drivers. They are libraries/tools to access that functionality in the kernel.
Re: (Score:2)
I think the 'teach a man to fish' answer would be that he needs a layer 1 or 2 tool, and nmap is for layer 3 and 4.
Re: (Score:2)
It's not exactly sniffing but take a look at all of the host detection scripts for IPv6: targets-ipv6-multicast-echo, targets-ipv6-multicast-invalid-dst, targets-ipv6-multicast-mld, targets-ipv6-multicast-slaac.
These scripts are using this feature "The new pre-scan occurs before Nmap starts scanning. Some of the initial pre-scan scripts use techniques like broadcast DNS service discovery or DNS zone transfers to enumerate hosts which can optionally be treated as targets.". So if you want to sniff an IPv4 n
Re: (Score:3)
What are you trying to do, nmap devices on a subnet without a DHCP server? Passive OS fingerprinting? Passive service discovery? Are you willing to do a little bit of switch ARP poisoning? All of the above to gather as much intel as possible without tripping too many IDS logs?
Re: (Score:2)
Switches only send unicast packets to hosts with the appropriate IP address.
Switches flood packets whenever their destination address's CAM entry expires, until they see another one to refresh the entry (unless switches have advanced port security/dot1x features turned on that prevent unicast flooding) so you will indeed see a bit of unicast traffic meant for other hosts, mostly hosts that are sporadically used, but also during STP topology changes.
This is not enough traffic to get much data at L7, but it is enough for L2/L3/L4 intelligence gathering. So it is theoretically possibl
Re: (Score:2)
FYI, the purpose is actually for dynamic configuration intelligence. Imagine having network static configuration data but without any interface names to associate it with. That and the newbie network admin just plugged the cables in the wrong ports (or ... is there a wrong port ... really).
Re: (Score:1)
Completely passive: Use tcpdump to gather packets from a promiscuous interface. There are usually lots of broadcasts including ARP queries, domain announcements, UPnP announcements, DHCP requests, etc. Wireshark will interpret all of this in easily digested form.
Active: Nmap can do ARP scans which broadcast queries and collect responses. You need to have some idea of what IP ranges are present (see above) to get meaningful results in reasonable time. No IP address is necessary to do this.
Re: (Score:2)
You'd either need to do some arp spoofing (Ettercap can do this) or be on a managed switch with port mirroring turned on, otherwise if you're on a regular switch port, you'll only see traffic that's actually destined for your MAC address, and regular broadcast traffic which tends to be less interesting (most of the time) than unicast traffic.
If you're playing with the arp tables, you can confuse switches to broadcast more traffic than they normally would, or if you've got a hub, you'll see what's going on i
Re: (Score:2)
I think the broadcast traffic will be sufficient. This could be augmented with some DHCP proding (try to get an address, but don't actually accept it ... just use it to get more information about what subnets other hosts think is here). The purpose is to detect which subnets are being used on this physical LAN ... for each interface ... before configuring them. A configuration table for this will exist, listing IP addresses and network prefixes. The idea is to figure out which interface to put them on w
Don't forget Gopher! (Score:5, Interesting)
Re: (Score:2)
Re: (Score:2)
ASFE: "Another Fucking Scripting Engine"
It isn't really, of course—it's Lua, which has a long history and is widely used, and is perfectly suited for the application...
Online Port Scanner Updated (Score:1)
For those who have not used ncat - I urge you to check it out [nmap.org]. With the portable windows version, you can drop this on a box and build encrypted tunnels. You can bring up a HTTP proxy in the time it takes you to type "ncat --proxy-type http -l 127.0.0.1 9090" It is a very handy little tool. When it comes to features ncat blows nc away.
Now to plug my service.
Online port scann [hackertarget.com]