{"id":2482,"date":"2010-02-02T08:17:51","date_gmt":"2010-02-02T08:17:51","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=2482"},"modified":"2015-09-09T19:37:43","modified_gmt":"2015-09-09T11:37:43","slug":"nmap-v5-20-released-open-source-network-exploration-auditing-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2010\/02\/nmap-v5-20-released-open-source-network-exploration-auditing-tool\/","title":{"rendered":"Nmap v5.20 Released – Open Source Network Exploration & Auditing Tool"},"content":{"rendered":"

[ad]<\/p>\n

Nmap<\/a> is of course of the most famous port scanners<\/a> and hacking tools<\/a> of all time, the last stable release was back in July 2009.<\/p>\n

For those that may not know, Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters\/firewalls are in use, and dozens of other characteristics.<\/p>\n

Nmap 5.20 offers more than 150 significant improvements, including:<\/p>\n