Nmap Announce mailing list archives

By Date By Thread Nmap 6.49BETA1 released! New scripts, new signatures, new ASCII art! From: Fyodor <fyodor () nmap org>

Date: Wed, 3 Jun 2015 22:28:29 -0700

Hi Folks. I'm happy to announce the release of Nmap 6.49BETA1. This version has hundreds of improvements, including: * 25 new NSE scripts (total is now 494) * Integrated all of your latest OS detection and version/service detection submissions (including IPv6). This allows Nmap to properly identify Linux 3.18, Windows 8.1, OS X 10.10, Android 5, etc. We now have more than 10,000 service detection signatures! * Infrastructure improvements: an official bug tracker ( http://issues.nmap.org) and the Nmap site is now SSL-secured ( https://nmap.org). We've also improved the Github mirror of our SVN tree ( https://github.com/nmap/nmap) * Many bug fixes, some performance improvements, and new ASCII art for anyone tired of the compile-time dragon! The dragon is still there and comes out 1/3 of the time. Nmap 6.49BETA1 source code and binary packages for Linux, Windows, and Mac are available for free download from: https://nmap.org/download.html And remember to always download Nmap from that official source, as many third-party download sites can't be trusted. Some years ago we caught CNet Download.com adding malware to Nmap ( http://insecure.org/news/download-com-fiasco.html) and yesterday we learned that the once-venerable project hosting site Sourceforge.net has hijacked many project accounts and began adding malware/adware to the installers for some of them: http://arstechnica.com/?p=674329 If you find any bugs in this release, please let us know on the Nmap dev list as described at https://nmap.org/book/man-bugs.html. Here are the most important changes since 6.47: o Integrated all of your IPv4 OS fingerprint submissions from May 2014 to February 2015 (1900+ of them). Added 281 fingerprints, bringing the new total to 4766. Addtions include Linux 3.18, Windows 8.1, OS X 10.10, Android 5.0, FreeBSD 10.1, OpenBSD 5.6, and more. Highlights: http://seclists.org/nmap-dev/2015/q2/169 [Daniel Miller] o Integrated all of your service/version detection fingerprints submitted from June 2013 to February 2015 (2500+ of them). The signature count soared over the 10000 mark, a 12% increase. We now detect 1062 protocols, from http, telnet, and ftp to jute, bgp, and slurm. Highlights: http://seclists.org/nmap-dev/2015/q2/171 [Daniel Miller] o Integrated all of your IPv6 OS fingerprint submissions from June 2013 to April 2015 (only 97 of them!). We are steadily improving the IPv6 database, but we need your submissions. The classifier added 9 new groups, bringing the new total to 90. Highlights: http://seclists.org/nmap-dev/2015/q2/170 [Daniel Miller] o Nmap now has an official bug tracker! We are using Github Issues, which you can reach from http://issues.nmap.org/. We welcome your bug reports, enhancement requests, and code submissions via the Issues and Pull Request features of Github (https://github.com/nmap/nmap), though the repository itself is just a mirror of our authoritative Subversion repository. o [Zenmap] New Chinese-language (zh) translation from Jie Jiang, new Hindi (hi) translation by Gyanendra Mishra, and updated translations for German (de, Chris Leick), Italian (it, Jan Reister), Polish (pl, Jacek Wielemborek), and French (fr, MaZ) o Added options --data <hex string> and --data-string <string> to send custom payloads in scan packet data. [Jay Bosamiya] o --reason is enabled for verbosity > 2, and now includes the TTL of received packets in Normal output (this was already present in XML) [Jay Bosamiya] o Update our Windows build system to VS 2013 on Windows 8.1. Also, we now build our included OpenSSL with DEP, ASLR, and SafeSEH enabled. [Daniel Miller] o Our OS X installer is now built for a minimum supported version of 10.8 (Mountain Lion), a much-needed update from 10.5 (Leopard). Additionally, OpenSSL is now statically linked, allowing us to distribute the latest from Macports instead of being subjected to the 0.9.8 branch still in use as of 10.9. [Daniel Miller] o New features for the IPv6 OS detection engine allow for better classification of systems: IPv6 guessed initial hop limit (TTL) and ratio of TCP initial window size to maximum segment size. [Alexandru Geana] o [NSE] Rework ssl-enum-ciphers to actually score the strength of the SSL/TLS handshake, including certificate key size and DH parameters if applicable. This is similar to Qualys's SSL Labs scanner, and means that we no longer maintain a list of scores per ciphersuite. [Daniel Miller] o All nmap.org pages are now available SSL-secured to improve privacy and ensure your binaries can't be tampered with in transit. So be sure to download from https://nmap.org/download.html. We will soon remove the non-SSL version of the site. We still offer GPG-signed binaries as well: https://nmap.org/book/install.html#inst-integrity o [NSE] Added 25 NSE scripts from 17 authors, bringing the total up to 494! They are all listed at https://nmap.org/nsedoc/, and the summaries are below (authors are listed in brackets): + bacnet-info gets device information from SCADA/ICS devices via BACnet (Building Automation and Control Networks) [Stephen Hilt, Michael Toecker] + docker-version detects and fingerprints Docker [Claudio Criscione] + enip-info gets device information from SCADA/ICS devices via EtherNet/IP [Stephen Hilt] + fcrdns performs a Forward-confirmed Reverse DNS lookup and reports anomalous results. [Daniel Miller] + http-avaya-ipoffice-users enumerates users in Avaya IP Office 7.x systems. [Paulino Calderon] + http-cisco-anyconnect gets version and tunnel information from Cisco SSL VPNs. [Patrik Karlsson] + http-crossdomainxml detects overly permissive crossdomain policies and finds trusted domain names available for purchase. [Paulino Calderon] + http-shellshock detects web applications vulnerable to Shellshock (CVE-2014-6271). [Paulino Calderon] + http-vuln-cve2006-3392 exploits a file disclosure vulnerability in Webmin. [Paul AMAR] + http-vuln-cve2014-2126, http-vuln-cve2014-2127, http-vuln-cve2014-2128 and http-vuln-cve2014-2129 detect specific vulnerabilities in Cisco AnyConnect SSL VPNs. [Patrik Karlsson] + http-vuln-cve2015-1427 detects Elasticsearch servers vulnerable to remote code execution. [Gyanendra Mishra] + http-vuln-cve2015-1635 detects Microsoft Windows systems vulnerable to MS15-034. [Paulino Calderon] + http-vuln-misfortune-cookie detects the "Misfortune Cookie" vulnerability in Allegro RomPager 4.07, commonly used in SOHO routers for TR-069 access. [Andrew Orr] + http-wordpress-plugins was renamed http-wordpress-enum and extended to enumerate both plugins and themes of Wordpress installations and their versions. http-wordpress-enum is now http-wordpress-users. [Paulino Calderon] + mikrotik-routeros-brute performs password auditing attacks against Mikrotik's RouterOS API. [Paulino Calderon] + omron-info gets device information from Omron PLCs via the FINS service. [Stephen Hilt] + s7-info gets device information from Siemens PLCs via the S7 service, tunneled over ISO-TSAP on TCP port 102. [Stephen Hilt] + snmp-info gets the enterprise number and other information from the snmpEngineID in an SNMPv3 response packet. [Daniel Miller] + ssl-ccs-injection detects whether a server is vulnerable to the SSL/TLS CCS Injection vulnerability (CVE-2014-0224) [Claudiu Perta] + ssl-poodle detects the POODLE bug in SSLv3 (CVE-2014-3566) [Daniel Miller] + supermicro-ipmi-conf exploits Supermicro IPMI/BMC controllers. [Paulino Calderon] + targets-ipv6-map4to6 generates target IPv6 addresses which correspond to IPv4 addresses mapped within a particular IPv6 subnet. [Raúl Fuentes] + targets-ipv6-wordlist generates target IPv6 addresses from a wordlist made of hexadecimal characters. [Raúl Fuentes] o Enhance Nmap's tcpwrapped service detection by using a shorter timeout for the tcpwrapped designation. This prevents falsely labeling services as tcpwrapped which merely have a read timeout shorter than 6 seconds. Full discussion: http://issues.nmap.org/39 [nnposter, Daniel Miller] o Fix ICMP Echo (-PE) host discovery for IPv6, broken since 6.45, caused by failing to set the ICMP ID for outgoing packets which is used to match incoming responses. [Andrew Waters] o Add 2 more ASCII-art configure splash images to be rotated randomly with the traditional dragon image. New ideas for other images to use here may be sent to dev () nmap org. [Jay Bosamiya, Daniel Miller] o Solve a crash on Windows (reported on Windows 8.1 on Surface Pro 3) caused by passing a NULL pointer to a WinPcap function that then tries to write an error message to it. [Peter Malecka] o Fix compilation and several bugs on AIX. [Daniel Miller] o Fix a bug in libdnet-stripped on Solaris that resulted in the wrong MAC address being detected for all interfaces. http://seclists.org/nmap-dev/2015/q2/1 [Daniel Miller] o [NSE] Improved http-form-brute autodetection and behavior to handle more unusual-but-valid HTML syntax, non-POST forms, success/failure testing on HTTP headers, and more. [nnposter] o [NSE] Reduce many NSE default timeouts and base them on Nmap's detected timeouts for those hosts from the port scan phase. Scripts which take timeout script-args can now handle 's' and 'ms' suffixes, just like Nmap's own options. [Daniel Miller] o [NSE] Remove db2-discover, as its functionality was performed by service version detection since the broadcast portion was separated into broadcast-db2-discover. http://seclists.org/nmap-dev/2014/q3/415 [Daniel Miller] o Cache dnet names not found on Windows when enumerating interfaces in the Windows Registry. Reduces startup times. [Elon Natovich] o [NSE] Make smb-ls able to leverage results from smb-enum-shares or list of shares specified on command line. [Pierre Lalet] o [NSE] Fix X509 cert date parsing for dates after 2049. Reported by Teppo Turtiainen. [Daniel Miller] o Handle a bunch of socket errors that can result from odd ICMP Type 3 Destination Unreachable messages received during service scanning. The crash reported was "Unexpected error in NSE_TYPE_READ callback. Error code: 92 (Protocol not available)" [Daniel Miller] o Fixed a crash (NULL pointer dereference) in PortList::isTCPwrapped when using -sV and -O on an unknown service not listed in nmap-services. [Pierre Lalet] o Fixed a benign TOCTOU race between stat() and open() in mmapfile(). Reported by Camille Mougey. [Henri Doreau] o Reduce CPU consumption when using nsock poll engine with no registered FD, by actually calling Poll() for the time until timeout, instead of directly returning zero and entering the loop again. [Henri Doreau] o Change the URI for the fingerprint submitter to its new location at https://nmap.org/cgi-bin/submit.cgi o [NSE] Added a check for Cisco ASA version disclosure, CVE-2014-3398, to http-enum in the 'security' category [Daniel Miller] o Fixed a bug that caused Nmap to fail to find any network interface when a Prism interface is in monitor mode. The fix was to define the ARP_HRD_IEEE80211_PRISM header identifier in the libdnet-stripped code. [Brad Johnson] o Added a version probe for Tor. [David Fifield] o [NSE] Add support to citrix-enum-apps-xml for reporting if Citrix published applications in the list are enforcing/requiring the level of ICA/session data encryption shown in the script result. [Tom Sellers] o [NSE] Updated our Wordpress plugin list to improve the http-wordpress-enum NSE script. We can now detect 34,077 plugins, up from 18,570. [Danila Poyarkov] o [NSE] Add the signature algorithm that was used to sign the target port's x509 certificate to the output of ssl-cert.nse [Tom Sellers] o [NSE] Fixed a bug in the sslcert.lua library that was triggered against certain services when version detection was used. [Tom Sellers] o [NSE] vulns.Report:make_output() now generates XML structured output reports automatically. [Paulino Calderon] o [NSE] Add port.reason_ttl, host.reason, host.reason_ttl for use in scripts [Jay Bosamiya] o [NSE] If a version script is run by name, nmap.version_intensity() returns the maximum value (9) for it [Jay Bosamiya] o [NSE] shortport.version_port_or_service() takes an optional rarity parameter now to run only when version intensity > rarity [Jay Bosamiya] o [NSE] Added nmap.version_intensity() function so that NSE version scripts can use the argument to --version-intensity (which can be overridden by the script arg 'script-intensity') in order to decide whether to run or not [Jay Bosamiya] o Improve OS detection; If a port is detected to be 'tcpwrapped', then it will not be used for OS detection. This helps in cases where a firewall might be the port to be 'tcpwrapped' [Jay Bosamiya] o [Zenmap] Reduce noise generated in Topology View due to anonymous hops [Jay Bosamiya] o Added option --exclude-ports to Nmap so that some ports can be excluded from scanning (for example, due to policy) [Jay Bosamiya] o [Zenmap] Catch the MemoryError caused in Zenmap due to large Nmap Output, and display a more helpful error message [Jay Bosamiya] o Catch badly named output files (such as those unintentionally caused by "-oX -sV logfile.xml") [Jay Bosamiya] o [Zenmap] Improved NmapParser to increase speed in opening scans. Large scans now open in seconds instead of hours. [Jay Bosamiya] o Modify the included libpcap configure script to disable certain unused features: bluetooth, usb, usb-can, and dbus sniffing. Dbus support caused a build problem on CentOS 6.5. [Daniel Miller] o Updated the bundled libpcap from 1.2.1 to 1.5.3 [Jay Bosamiya] o Correct the Target MAC Address in Nmap's ARP discovery to conform to what IP stacks in currently popular operating systems use. [Jay Bosamiya] o Fixed a bug which caused Nmap to be unable to have any runtime interaction when called from sudo or from a shell script. [Jay Bosamiya] o Improvements to whois-ip.nse: fix an unhandled error when a referred-to response could not be understood; add a new pattern to recognise a LACNIC "record not found" type of response and update the way ARIN is queried. [jah] Enjoy the new release! -Fyodor _______________________________________________ Sent through the announce mailing list http://nmap.org/mailman/listinfo/announce Archived at http://seclists.org/nmap-hackers/ By Date By Thread Current thread: Nmap 6.49BETA1 released! New scripts, new signatures, new ASCII art! Fyodor (Jun 03)