Nmap Development mailing list archives

Re: Nmap 4.20ALPHA1 - New OS Detection System!


From: Brandon Enright <bmenrigh () ucsd edu>
Date: Sun, 25 Jun 2006 03:16:58 +0000

I can't wait to get started testing this.  The code built cleanly but
I'm getting:

./nmap -O 192.168.0.1
OS scan requested but I cannot find nmap-os-db file.  It should be
in /usr/local/share/nmap, ~/.nmap/ or .
QUITTING!

I've looked but I can't find the file either.

Since I'm sure the db file will be evolving rapidly and doing a new
release every time a few signatures are added will be tedious, perhaps
you can make the latest db available online somewhere for us to grab as
it gets updated.

Brandon

-- 
Brandon Enright
Network Security Analyst
UCSD ACS/Network Operations
bmenrigh () ucsd edu


On Sat, 2006-06-24 at 19:59 -0700, Fyodor wrote:
Hello everyone,

It is time to start off the big Nmap Summer '06 development cycle!
I'm starting things off by integrating the 5,000-line 2nd generation
OS detection patch!  While that new system is the immediate focus,
I'll also be integrating other patches from SoC participants and
elsewhere in the near future.  This starts with 4.20ALPHA1, which you
can find here:

http://download.insecure.org/nmap/dist/nmap-4.20ALPHA1.tar.bz2
http://download.insecure.org/nmap/dist/nmap-4.20ALPHA1.tgz
http://download.insecure.org/nmap/dist/nmap-4.20ALPHA1-1.src.rpm
http://download.insecure.org/nmap/dist/nmap-4.20ALPHA1-1.i386.rpm
http://download.insecure.org/nmap/dist/nmap-frontend-4.20ALPHA1-1.i386.rpm
http://download.insecure.org/nmap/dist/nmap-4.20ALPHA1-1.x86_64.rpm
http://download.insecure.org/nmap/dist/nmap-frontend-4.20ALPHA1-1.x86_64.rpm

Note that there is no Win32 version at this time.  I haven't tested on
that platform, but hope to have it working for the next release.

This release hasn't been tested all that much, so its not for sissies!
But for the more adventurous types, please give it a try and post your
experiences and suggestions.  Note that the new OS detection system
only has 2 signatures right now, since we have made so many changes
and had to throw out some of the previous sigs.  But the system falls
back to the old OS detection system if it fails to find a match.  You
can also explicitly use (just) the old system with -O1.

Enjoy,
Fyodor



_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev


Current thread: