Nmap 7.94 Network Security Scanner Released

published the release of the network security scanner nmap 7.94 , intended for conducting a network audit and identifying active network services. The project code is delivered under the license npsl based on the GPLV2 license, which is supplemented by recommendations for the use of the OEM-Licensing program and buying a commercial license if the manufacturer is not He wants to open the code of his product in accordance with the requirements of coplet-license or intends to integrate NMAP into products incompatible with GPL.

The main changes :

  • gui zenmap and NDIFF utility are transferred to the use of Python 3. In
    Zenmap is involved in the Pygobject library instead of Pygtk to form a graphic interface.
  • Updated signature databases to determine network applications and operating systems. 22 new operating system signatures have been added that determine fresh versions
    Windows, iOS, MacOS, Linux and BSD systems. The total number of signatures was brought 5700.
  • to the version 1.75 updated the library npcap used for capture and substitution of packages on the Windows platform. The library is developing a NMAP project as a replacement of Winpcap, built using modern Windows API NDIS 6 LWF and demonstrates higher performance, safety and reliability.
  • The output of manufacturers on the basis of MAC addresses with prefixes MA-S (24-bit), MA-M (28-bit) and MA-L (36-bit) is ensured. Previously, only a 3-byte prefix from the MAC address was used to determine the manufacturer.
  • To the Windows installer, support is added to “quiet” mode installation (/s).
  • Optimized memory consumption and increased code productivity to determine the operating system, search for services, comparison and re -transmission checks. Reduced launch time.
  • Added new nse script tftp-version, requesting a non-existent file from the TFTP server and on the basis of the error text that determines the name and version of TFTP -server.
  • In the NCAT utility, the “Connections” of several hosts for UDP is allowed when using the Listen mode with the “–keep-Open” option. Change allows the use of “–broker” and “–chat” through UDP.
  • in NCAT.

  • In finished assemblies, the versions of the libraries Opensl 3.0.8, Zlib 1.2.13, Lua 5.4.4, Libpcap 1.10.4.
  • Sports scan modes UDP (-su) and determination of versions (-sv) are translated to the use of the general source of data Nmap-Service-Probes.
  • In the scan of services (-sv), the possibility of determining the UDP services available through the DTLS tunnel (by analogy with TCP services for which encryption of SSL/TLS is used).
  • in the NCAT utility, when working in Listen mode and indicating the options –UDP –SSL, to protect incoming compounds, the use of DTLS.
/Reports, release notes, official announcements.