Nmap (“Network Mapper”) is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are avalable for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), and a utility for comparing scan results (Ndiff).”
This is the change log:
  • [Ndiff] Added support for prerule and postrule scripts. [David]
  • [NSE] Fixed a bug which caused some NSE scripts tfail due the absence of the NSE SCRIPT_NAME environment variable when loaded. Michael Pattrick reported the problem. [Djalal]
  • [Zenmap] Selecting one of the scan targets in the left pane is supposed tjump tthat host in the Nmap Output in the right pane (but it wasn’t).  Brian Krebs reported this bug. [David]
  • Fixed an obscure bug in Windows interface matching. If the MAC address of an interface couldn’t be retrieved, it might have been used instead of the correct interface. Alexander Khodyrev reported the problem.  [David]
  • [NSE] Fixed portrules in dns-zone-transfer and ftp-proftpd-backdoor that used shortport functions incorrectly and always returned true. [Jost Krieger]
  • [Ndiff] Fixed ndiff.dtd tinclude twelements that can be diffed: status and address. [Daniel Miller]
  • [Ndiff] Fixed the ordering of hostscript-related elements in XML output. [Daniel Miller]
  • [NSE] Fixed a bug in the nrpe-enum script that would make it run for every port (when it was selected–it isn’t by default). Daniel Miller reported the bug. [Patrick]
  • [NSE] When an NSE script sets a negative socket timeout, it now causes a controlled Lua stack trace instead of a fatal error. VlatkKosturjak reported the bug. [David]
  • [Zenmap] Worked around an error that caused the py2app bootstrap executable tbe non-universal even when the rest of the application was universal. This prevented the binary .dmg from working on PowerPC. Yxynaxen reported the problem. [David]
  • [Ndiff] Fixed an output line that wasn’t being redirected ta file when all other output was. [Daniel Miller]
This version fixes some bugs that were introduced in the last Nmap 5.50.

Have something to say about this article? Comment below or share it with us on Facebook, Twitter or our LinkedIn Group.