Nmap 6.01

Gordon Lyon - (Open Source)



Nmap is a powerful and indispensable tool for all network administrators developed to explore and perform an audit or a computer network hardware inventory.

Nmap ("Network Mapper") is a software application that allows to detect open ports as well as information on a remote computer. Network administrators can use to identify the network status, manage schedules update services and monitor the availability of each item.

Using uses TCP, ICMP, IP or UDP it identifies services hosted on a computer. Thus, information such as the operating system or available ports can be accessed. Specific reports also allow to perform a specific audit of the safety and security of the system.

The functional graphical user interface provides access to a wealth of information at the first glance.

Title:
Nmap 6.01
File Size:
24.9 MB
Requirements:
Windows 2000 / XP / Vista / Windows7 / XP64 / Vista64 / Windows7 64 / Windows8 / Windows8 64
Language:
en-us
License:
Open Source
Date Added:
18 Jun 2012
Publisher:
Gordon Lyon
Homepage:
http://nmap.org
MD5 Checksum:
538AE956097D9EE5813441561EC4AD33

- [Zenmap] Fixed a hang that would occur on Mac OS X 10.7. A symptom of the hang was this message in the system console: "Couldn't recognize the image file format for file '/Applications/Zenmap.app/Contents/MacOS/../Resources/share/zenmap/pixmaps/radialnet/padlock.png'".
- [Zenmap] Fixed a crash that happened when activating the host filter. File "zenmapCoreSearchResult.pyo", line 155, in match_os KeyError: 'osmatches'
- Fixed an error that occurred when scanning certain addresses like 192.168.0.0 on Windows XP: get_srcaddr: can't connect socket: The requested address is not valid in its context. nexthost: failed to determine route to 10.80.0.0
- Fixed a bug that caused Nmap to fail to find any network interface when at least one of them is in the monitor mode. The fix was to define the ARP_HRD_IEEE80211_RADIOTAP 802.11 radiotap header identifier in the libdnet-stripped code. Network interfaces that are in this mode are used by radiotap for 802.11 frame injection and reception.
- Fixed the greppable output of hosts that time-out (when --host-timeout was used and the host timed-out after something was received from that host).
- [Zenmap] Updated the version of Python used to build the Windows release from 2.7.1 to 2.7.3 to remove a false-positive security alarm flagged by tools such as Secunia PSI. There was a minor vulnerability in certain Python27.dll web functionality (which Nmap doesn't use anyway) and Secunia was flagging all software which includes that version of Python27.dll. This update should prevent the false alarm.




Screenshots

Related software





User Rating:

3.2/5 from 65 users