Nmap 7.90 has already been released and these are its news

nmap-logo

The launch of the new version of the network security scanner "Nmap 7.90" which is designed to audit the network and identify active network services. In this new version 3 new NSE scripts were included to provide automation of various actions with Nmap, plus more than 1200 new signatures added to detect network applications and operating systems.

For those unfamiliar with Nmap, you should know that this is an open source utility that is used to perform port scanning. It was originally created for Linux although it is currently cross-platform. It is used to evaluate the security of computer systemsAs well as to discover services or servers on a computer network, for this Nmap sends defined packets to other computers and analyzes their responses.

Main new features of Nmap 7.90

One of the most important changes in this new version of Nmap 7.90, is that moved from using a modified GPLv2 license to the Nmap public source license, which has not fundamentally changed and it is also based on GPLv2, but it is better structured and clearer.

Differences from GPLv2 boil down to the addition of some exceptions and conditions, such as the ability to use Nmap code in GPL-incompatible licensed products after obtaining permission from the author, and the need to separately license the delivery and use of nmap as part of proprietary products.

Regarding the changes that were made in Nmap 7.90, it is noted that more than 800 application and service version identifiers have been added, and the total size of the identifier database has reached 11878 entries.

Besides whate around 400 operating system identifiers were added, 330 for IPv4 and 67 for IPv6, including identifiers for iOS 12/13, macOS Catalina and Mojave, Linux 5.4, and FreeBSD 13. The number of discoverable versions of the operating system has risen to 5678.

Along with it too Added definition for MySQL 8.x, Microsoft SQL Server 2019, MariaDB, Crate.io CrateDB, and PostreSQL installations on Docker.

Added 23 new UDP inspection requests (UDP payload, protocol specific requests that respond rather than ignore a UDP packet) created for the Rapid7 InsightVM network scan engine to improve detection accuracy of various UDP services.

Moreover new libraries have been added to the Nmap Scripting Engine (NSE), designed to automate various actions with Nmap: outlib with functions to process the output and format strings, and dicom with the implementation of the DICOM protocol used to store and transfer medical images.

  • dicom-brute: for the selection of AET identifiers (Application entity title) in DICOM servers (Digital images and communications in medicine);
  • dicom-ping: to find DICOM servers and determine connectivity using AET ID
  • uptime-agent-info: to collect system information from Idera Uptime agents
  • InfrastructureMonitor.

The number of defined protocols has increased from 1193 to 1237, including support for the airmedia-audio, banner-ivu, control-m, insteon-plm, pi-hole-stats, and ums-webviewer protocols.

Of the other changes that stand out:

  • Added UDP requests to detect STUN (Session Crossing Utilities for NAT) and GPRS Tunneling Protocol (GTP).
  • Added "–discovery-ignore-rst" option to ignore TCP RST responses when determining destination host status (helps if firewalls or traffic inspection systems inject RST packets to terminate connection).
  • Added "–ssl-servername" option to change hostname value in TLS SNI.
  • Added the ability to use the "–resume" option to resume interrupted IPv6 scanning sessions.

Finally, if you want to know more about this new version, you can check the details in the following link.

How to install Nmap 7.90 on Linux?

For those who are interested in being able to install Nmap along with its other tools on their system, They can do it by following the steps we share below.

Since the release of this new version of Nmap was recently, few distributions have already updated to this version. So they must wait a few days.

Though we can resort to compiling the source code of the application in our system. The code can be downloaded and compiled by executing the following:

wget https://nmap.org/dist/nmap-7.90.tar.bz2
bzip2 -cd nmap-7.90.tar.bz2 | tar xvf -
cd nmap-7.90
./configure
make
su root
make install

In the case of distributions with support for RPM packages, they can install the Nmap 7.90 package by opening a terminal and executing the following commands:

sudo rpm -vhU https://nmap.org/dist/nmap-7.90-1.x86_64.rpm
sudo rpm -vhU https://nmap.org/dist/zenmap-7.90-1.noarch.rpm
sudo rpm -vhU https://nmap.org/dist/ncat-7.90-1.x86_64.rpm
sudo rpm -vhU https://nmap.org/dist/nping-0.7.90-1.x86_64.rpm

Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.