Download Nmap 4.85 Beta 6

Spread the love

Nmap is a program for exploring and monitoring a network. It is designed to scan a large network without any delays, and it also runs smoothly on a single host. The program uses so-called ‘raw ip packets’ to retrieve active hosts and information about the available services. More information about the possibilities can be found at this page. The developers have released a new beta version with which, among other things, the Conficker worm can be traced. The version number is pinned to 4.85 beta 6 and includes the following announcement:

Hi Folks! In case you missed all the news reports yesterday, a couple great researchers from the Honeynet Project (Tillmann Werner and Felix Leder) and Dan Kaminsky came up with a way to remotely detect the Conficker worm which has infected millions of machines worldwide. Some say 15,000,000 machines infected, but that might just be exaggerated AV-company BS for all I know. But there are clearly millions of infections, and this massive botnet is scheduled for a new update cycle starting tomorrow. Will this cause Internet doom? No, but the bad guys might fix the mechanism that lets us remotely detect ’em. Or they might engage in other mischief with their botnet. That’s why we did the emergency releases–so you can scan for and remove them early! During the process, I had to infect one of my systems with Conficker for testing, and Nmap even got booted from Dreamhost’s “unlimited bandwidth” hosting because the downloads were taking too much bandwidth. they said:

    “Sadly your file nmap-4.85BETA5-setup.exe, and a few similar, were getting so many downloads on your machine, iceman, that it saturated out the 100mbit connection on it, and cause everyone else’s sites to go down.”

Dreamhost blocked further downloads, but we quickly switched to using our colocation provider and also got some mirroring help from Brandon Enright at UCSD! So UCSD is hosting 4.85BETA6. Of course I’d like to thank Ron Bowes who wrote the detection code (it is an update to his existing smb-check-vulns SMB script). David Fifield was a huge help too.

An example Conficker scan command is:
nmap -PN -T4 -p139,445 -n -v –script=smb-check-vulns –script-args safe=1 [targetnets]

A clean machine should report at the bottom: “Conflicker: Likely Clean”, while likely infected machines report “Conflicker: Likely INFECTED”.

Of course we have some other nice improvements besides Conficker detection.

Enjoy the new release and disable those systems!
-Fyodor

Nmap 4.85BETA6:

  • Fixed some bugs with the Conficker detection script (smb-check-vulns) [Ron]:
    • SMB response timeout raised to 20s from 5s to compensate for slow/overloaded systems and networks.
    • MSRPC now only signs messages if OpenSSL is available (avoids an error).
    • Better error checking for MS08-067 patch
    • Fixed forgotten endian modifier (caused problems on big-endian systems such as Solaris on SPARC).
  • Host status messages (up/down) are now uniform between ping scanning and port scanning and include more information. They used to vary slightly, but now all look like
    Host is up (Xs latency).
    Host is down.
    The new latency information is Nmap’s estimate of the round trip time. In addition, the reason for a host being up is now printed for port scans just as for ping scans, with the –reason option. [David]
  • Version detection now has a generic match line for SSLv3 servers, which matches more servers than the already-existing set of specific match lines. The match line found 13% more SSL servers in a test. Note that Nmap will not be able to do SSL scan-through against a small fraction of these servers, those that are SSLv3-only or TLSv1-only, because that ability is not yet built into Nsock. There is also a new version detection probe that works against SSLv2-only servers. These have shown themselves to be very rare, so that probe is not sent by default. Kristof Boeynaems provided the patch and did the testing.
  • [Zenmap] A typo that led to a crash if the ndiff subprocess terminated with an error was fixed. [David] The message was
    File “zenmapGUI\DiffCompare.pyo”, line 331, in check_ndiff_process
    UnboundLocalError: local variable ‘error_test’ referenced before assignment
  • [Zenmap] A crash was fixed:
    File “zenmapGUI\SearchGUI.pyo”, line 582, in operator_changed
    KeyError: “Syst\xc3\xa8me d’Exploitation”
    The text could be different, because the error was caused by translating a string that was also being used as an index into an internal data structure. The string will be untranslated until that part of the code can be rewritten. [David]
  • [Zenmap] A bug was fixed that caused a crash when doing a keyword: or target: search over hosts that had a MAC address. [David] The crash output was
    File “zenmapCore\SearchResult.pyo”, line 86, in match_keyword
    File “zenmapCore\SearchResult.pyo”, line 183, in match_target
    TypeError: argument of type ‘NoneType’ is not iterable
  • Fixed a bug which prevented all comma-separated –script arguments from being shown in Nmap normal and XML output files where they show the original Nmap command. [David]
  • Fixed ping scanner’s runtime statistics system so that instead of saying “0 undergoing Ping Scan” it gives the actual number of hosts in the group (eg 4096). [David]
  • [Zenmap] A crash was fixed in displaying the “Error creating the per-user configuration directory” dialog:
    File “zenmap”, line 104, in File “zenmapGUI\App.pyo”, line 129, in run UnicodeDecodeError: ‘utf8’ codec can’t decode bytes in position 43-45: invalid data
    The crash would only happen to users with paths containing multibyte characters in a non-UTF-8 locale, who also had some error preventing the creation of the directory. [David]

Version number 4.85 beta 6
Release status beta
Operating systems Windows 2000, Linux, BSD, Windows XP, macOS, OS/2, Solaris, UNIX, Windows Server 2003, Windows Server 2003 x64, Windows Vista, Windows Vista x64, Windows Server 2008
Website Nmap
Download
License type GPL
You might also like
Exit mobile version