Wednesday, April 23, 2014

Nmap 6.46

  • System requirements:

    Windows 2000 / XP / Vista / Windows 7 / XP64 / Vista64 / Windows 7 64 / Windows 8 / Windows 8 64

  • Editor / User Rating:

    /
  • Author / Product:

    Gordon Lyon / Nmap

  • Old Versions:

  • Filename:

    nmap-6.46-setup.exe

  • MD5 Hash:

    624f2d3c9475df0774a8c824b5558331

Nmap (also known as Network Mapper) is a free and open source tool that enables you to check the networks in your environment. Not only that you can see detailed information about them, but you can also test and audit their security status, a feature that will be welcomed by professional network administrators who maintain large network clusters.

With Nmap you can perform various network tasks, such as upgrade schedules, network inventories, monitor host or service uptimes, and much more. It’s raw IP packet processing can determine available hosts on the network, active services (their name and version), operating systems, type of firewall/packet filters are in use, and many other characteristics that can be extracted from a network scan. Professional users will be glad to hear that in addition to the advanced GUI result viewer, Nmap also features powerful classic command-line executable. In addition to that, you can also access tool that compares scan results, debugging and data transfer redirection tool, and a packet monitoring tool.

Interface of Nmap is without any doubt focused to be used by IT professionals and users with already acquired technical knowledge about Windows ecosystem and networking. Main dashboard of this app offers very large array of tools and services that can provide users all the insights of the network of their computer, easy profiling, benchmarking and identifying all the minute details about local and external connections.

Tags: nmap, n map, network mapper, network host, packet filter, advanced features, network exploration, security auditing, packets, mapper, map, network, scan, scanner, firewalls, routers

What's new in this version:

- [NSE] Made numerous improvements to ssl-heartbleed to provide more reliable detection of the vulnerability.
- [Zenmap] Fixed a bug which caused this crash message: IOError: [Errno socket error] [Errno 10060] A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond
- The bug was caused by us adding a DOCTYPE definition to Nmap's XML output which caused Python's XML parser to try and fetch the DTD every time it parses an XML file. We now override that DTD-fetching behavior.
- [NSE] Fix some bugs which could cause snmp-ios-config and snmp-sysdescr scripts to crash
- [NSE] Improved performance of citrixlua library when handling large XML responses containing application lists.

Description of Nmap 6.46

No comments:

Post a Comment