Nmap 7.93 released with improvements and bug fixes

And Nmap 7.93 was released with improvements and bug fixes. Check out the news and see how to install on Linux.

Nmap is an open source utility used for port monitoring. It was originally created for Linux, although it is currently cross-platform.

It is used to assess the security of computer systems, as well as to discover services or servers on a computer network, because this Nmap sends defined packets to other computers and analyzes their responses.

Nmap developers recently announced the release of a new version 7.93.

What’s new in Nmap 7.93

Nmap 7.93 released with improvements and bug fixes

The Nmap 7.93 release was supposed to be released on the 25th anniversary of the project.

“25 years ago I released the first version of Nmap on
Phrack’s article called The Art of Port Scanning (https://nmap.org/p51-11.html).
I never thought I’d still be at this a quarter of a century later, but here I am
because I also did not expect such a wonderful community of users and
collaborators during these decades. You helped develop Nmap from a
a fairly simple port scanner for a complete network discovery application.
It is trusted by millions of users every day. Thank you for that.

And we’re not done yet!”

It should be noted that over the years the project has evolved from a conceptual port scanner, published in 1997 in Phrack magazine, to a full-featured application for analyzing network security and determining which server applications are being used.

Nmap 7.93 primarily includes fixes and improvements aimed at improving stability and addressing known issues before work begins on the major new Nmap 8 branch.

In this new version of Nmap 7.93, Npcap will be released, it is used to capture and replace packages on Windows platform, it has been updated to version 1.71.

The library was developed by the Nmap project as a replacement for WinPcap, built using the modern Windows NDIS 6 LWF API, and shows increased performance, security and reliability.

The NSE (Nmap Scripting Engine), which allows you to run scripts to automate various actions with Nmap, has improved exception and event handling, as well as custom return of unused pcap sockets.

In addition, it was also noted that the NSE script features dhcp-discover/broadcast-dhcp-discover (allows setting client ID), oracle-tns-version (added detection of Oracle 19c+ versions), redis-info (fixed issues with displaying incorrect information about links and cluster nodes).

Another notable new feature in Nmap 7.93 is that Ncat has added support for SOCKS5 proxies that return the connection address in the form of a hostname instead of an IPv4/IPv6 address.

Among other changes that stand out in Nmap 7.93, we have:

  • Updated signature databases to identify network applications and operating systems.
  • A version with OpenSSL 3.0 has been shipped, without deprecated function calls in the new branch.
  • Updated libraries libssh2 1.10.0, zlib 1.2.12, Lua 5.3.6, libpcap 1.10.1.
  • Replaced legacy Common Platform Enumeration (CPE) identifiers for IIS services.
  • Fixed TDS7 password encoding for mssql.lua, which assumed ASCII input even though other parts of the library passed Unicode.
  • Fixes hostname/certificate matching and matching for handling ASN.1 strings without null terminators, bug similar to OpenSSL CVE-2021-3712.
  • Problems with determining routing information on the FreeBSD platform have been resolved.
  • Fixed an issue with detecting Linux network interfaces that do not have IPv4 addresses associated with them.

To learn more about this version of Nmap, see the release notes.

How to install or update Nmap

To install the latest version of Nmap on major Linux distributions, use this guide:
How to install the powerful Nmap network utility on Linux

And for those who prefer to install from source code, just open a terminal and run the following commands:
wget https://nmap.org/dist/nmap-7.93.tar.bz2
bzip2 -cd nmap-7.93.tar.bz2 | tar xvf -
cd nmap-7.93
su root
make install

Leave a Reply

Your email address will not be published. Required fields are marked *