Horraaayy.. After almost 3 years development, Nmap-dev launch Nmap 6, the latest Nmap version. This version has some enhancements, like NSE Script Enhanced (289 new NSE Scripts), Faster scanning, Full IPV6 SUpport, New Nping Tools. Bentter Zenmap GUI, etc. Okay, i will copy paste from Nmap Official Page about the new version and details about new enhancement and new feature.
1. NSE Enhanced
The Nmap Scripting Engine (NSE) has exploded in popularity and capabilities. This modular system allows users to automate a wide variety of networking tasks, from querying network applications for configuration information to vulnerability detection and advanced host discovery. The script count has grown from 59 in Nmap 5 to 348 in Nmap 6, and all of them are documented and categorized in our NSE Documentation Portal. The underlying NSE infrastructure has improved dramatically as well.
2. Better Web Scanning
As the Internet has grown more web-centric, Nmap has developed web scanning capabilities to keep pace. When Nmap was first released in 1997, most of the network services offered by a server listened on individual TCP or UDP ports and could be found with a simple port scan. Now, applications are just as commonly accessed via URL path instead, all sharing a web server listening on a single port. Nmap now includes many techniques for enumerating those applications, as well as performing a wide variety of other HTTP tasks, from web site spidering to brute force authentication cracking. Technologies such as SSL encryption, HTTP pipelining, and caching mechanisms are well supported.
3. Full IPv6 Support
Given the exhaustion of available IPv4 addresses, the Internet community is trying to move to IPv6. Nmap has been a leader in the transition, offering basic IPv6 support since 2002. But basic support isn’t enough, so we spent many months ensuring that Nmap version 6 contains full support for IP version 6. And we released it just in time for the World IPv6 Launch.
We’ve created a new IPv6 OS detection system, advanced host discovery, raw-packet IPv6 port scanning, and many NSE scripts for IPv6-related protocols. It’s easy to use too—just specify the -6 argument along with IPv6 target IP addresses or DNS records. In addition, all of our web sites are now accessible via IPv6. For example, Nmap.org can be found at 2600:3c01::f03c:91ff:fe96:967c.
4. New Nping Tool
The newest member of the Nmap suite of networking and security tools is Nping, an open source tool for network packet generation, response analysis and response time measurement. Nping can generate network packets for a wide range of protocols, allowing full control over protocol headers. While Nping can be used as a simple ping utility to detect active hosts, it can also be used as a raw packet generator for network stack stress testing, ARP poisoning, Denial of Service attacks, route tracing, etc. Nping’s novel echo mode lets users see how packets change in transit between the source and destination hosts. That’s a great way to understand firewall rules, detect packet corruption, and more.
5. Better Zenmap GUI & results viewer
While Nmap started out as a command-line tool and many (possibly most) users still use it that way, we’ve also developed an enhanced GUI and results viewer named Zenmap. One addition since Nmap 5 is a “filter hosts” feature which allows you to see only the hosts which match your criteria (e.g. Linux boxes, hosts running Apache, etc.) We’ve also localized the GUI to support five languages besides English. A new script selection interface helps you find and execute Nmap NSE scripts. It even tells you what arguments each script supports.
6. Faster scans
In Nmap’s 15-year history, performance has always been a top priority. Whether scanning one target or a million, users want scans to run as fast as possible without sacrificing accuracy. Since Nmap 5 we’ve rewritten the traceroute system for higher performance and increased the allowed parallelism of the Nmap Scripting Engine and version detection subsystems. We also performed an intense memory audit which reduced peak consumption during our benchmark scan by 90%. We made many improvements to Zenmap data structures and algorithms as well so that it can now handle large enterprise scans with ease.
Nmap now supports the old-school Gopher protocol thanks to our handy gopher-ls NSE script. We even support Gopher over IPv6! So for all of you out there with gopher servers running on IPv6, nmap will work for you!
Download Link for Nmap verion 6:
Windows Machine :
http://nmap.org/dist/nmap-6.00-win32.zip (Nmap COmmand Line)
http://nmap.org/dist/nmap-6.00-setup.exe (Nmap Include Zenmap)
Mac OSX Machine :
Linux Machine (Source Code Installer) :
Install Nmap in Linux :
digit@digit-laptop:~$ bzip2 -cd nmap-6.00.tar.bz2 | tar xvf - digit@digit-laptop:~$ cd nmap-6.00 digit@digit-laptop:~$ ./configure digit@digit-laptop:~$ make digit@digit-laptop:~$ sudo make install
Linux RPM Source and Binary :
rpm -vhU http://nmap.org/dist/nmap-6.00-1.i386.rpm rpm -vhU http://nmap.org/dist/zenmap-6.00-1.noarch.rpm rpm -vhU http://nmap.org/dist/ncat-6.00-1.i386.rpm rpm -vhU http://nmap.org/dist/nping-0.6.00-1.i386.rpm
You can also download and install the RPMs yourself:
Latest development release:
ii386 Nmap RPM: nmap-6.00-1.i386.rpm
i386 Ncat RPM: ncat-6.00-1.i386.rpm
i386 Nping RPM: nping-0.6.00-1.i386.rpm
x86-64 (64-bit Linux only!) Nmap RPM: nmap-6.00-1.x86_64.rpm
x86-64 (64-bit Linux only!) Ncat RPM: ncat-6.00-1.x86_64.rpm
x86-64 (64-bit Linux only!) Nping RPM: nping-0.6.00-1.x86_64.rpm
Optional Zenmap GUI (all platforms): zenmap-6.00-1.noarch.rpm
Source RPM (includes Nmap, Zenmap, Ncat, and Nping): nmap-6.00-1.src.rpm
Okay that’s all for tonight. Tomorrow, i’ll write about some great NSE Scripts. Ahaaaa.. Let’s playing with Nmap Script Engine :D
Happy Hackng :D