Nmap 2.54BETA30 released
Well looks like everyone's favourite network scanner, nmap has reached a BETA 30 release. The new version contains a number of important fixes and updates. The CHANGELOG entry is listed below...
o Added a Document Type Definition (DTD) for the Nmap XML output
format (-oX) to the docs directory. This allows validating parsers
to check nmap XML output files for correctness. It is also useful
for application programmers to understand the XML output structure.
The DTD was written by William McVey (wam@cisco.com) of Cisco Secure
Consulting Services ( http://www.cisco.com/go/securityconsulting ).
o Merged in a number of Windows fixes/updates from Andy Lutomirski
(Luto@myrealbox.com)
o Merged in fixes/updates (mostly to the Windows functionality) from
Matt Hargett (matt@use.net)
o Applied patch by Colin Phipps (cph@netcraft.com) which correctly
encodes special characters in the XML output.
o Applied patch by William McVey (wam@cisco.com) which adds the uptime
information printed with -O to the XML output format.
o Fixed byte-order bug in Windows packet matching code which caused
-PS and -PT to fail. Bug found and patch sent by Tim Adam
(tma@osa.com.au)
o Fixed segfault problem with "-sU -F". Nobody reported this until I
noticed it :(. Anytime you see "Segmentation Fault" in the latest
version of Nmap, it is probably a bug -- please mail me the command
you used, the OS/platform you are running on, and whether it is
reproducable.
o Added a convenience option "-oA (basefilename)". This tells Nmap to
log in ALL the major formats (normal, grepable, and XML). You give
a base for the filename, and the output files will be base.nmap,
base.gnmap, and base.xml.
o Documented the --append_output option which tells Nmap to append
scan results to any output files you have specified rather than
overwriting the files.
o Integrate TIMEVAL_SEC_SUBTRACT() fix by Scott Renfro (scott@renfro.org)
which improves timing accuracy.
For those of you running Linux/x86 w/a recent version of rpm
(www.rpm.org), you can install/upgrade to the newest version of
nmap/nmapfe with these commands:
rpm -vhU (nmap url)
where (nmap url) is one (or both) of these:
http://download.insecure.org/nmap/dist/nmap-2.54BETA30-1.i386.rpm
http://download.insecure.org/nmap/dist/nmap-frontend-0.2.54BETA30-1.i386.rpm
source tarballs and source RPMs are always available at:
http://www.insecure.org/nmap/nmap_download.html
For the more paranoid (smart) members of the list, here are the md5
hashes:
6b528d2c7e6354c38cf4e938ece21805 nmap-2.54BETA30-1.i386.rpm
09e8f81d5ab99d5a12d60f0ef3da51b5 nmap-2.54BETA30-1.src.rpm
c43117c4a8d9f8e636398b1efe6dd00f nmap-2.54BETA30.tgz
3450a03983dc7524e765d3e13f2aa37f nmap-frontend-0.2.54BETA30-1.i386.rpm