Nmap Network Security Scanner 7.80 Released

Almost a year and a half since the last release submitted network security scanner release Nmap 7.80, designed to conduct a network audit and identify active network services. Part included 11 new NSE scripts to provide automation of various actions with Nmap. Signature databases have been updated to identify network applications and operating systems.

Recently, the main work has been focused on improving and stabilizing the library npcap, developed for the Windows platform as a replacement for WinPcap and using the modern Windows API to organize packet capture. Many minor improvements have been made to the Nmap Scripting Engine (NSE) and related libraries. Nsock and Ncat added support for sockets with AF_VSOCK addressing, running on top of virtio and used for communication between virtual machines and the hypervisor. Implemented detection of the adb (Android Debug Bridge) service, which is enabled by default on many mobile devices.

New NSE scripts:

  • broadcast-hid-discoveryd - determines the presence of HID devices (Human interface devices) on the local network by sending broadcast requests;
  • broadcast-jenkins-discover - detects Jenkins servers on the local network by sending broadcast requests;
  • http-hp-ilo-info - retrieves information from HP servers that support remote management technology iLO iLO;
  • http-sap-netweaver-leak - detects the presence of SAP Netweaver Portal with the Knowledge Management Unit enabled, allowing anonymous access;
  • https-redirect - detects HTTP servers that redirect requests to HTTPS without change port numbers;
  • lu-enum - enumerates logical blocks (LU, Logical Units) of TN3270E servers;
  • rdp-ntlm-info - retrieves Windows domain information from RDP services;
  • smb-vuln-webexec - checks the installation of the WebExService (Cisco WebEx Meetings) service and the presence of vulnerabilities, allowing code execution;
  • smb-webexec-exploit - exploits a vulnerability in WebExService to run code with SYSTEM privileges;
  • ubiquiti-discovery - retrieves information from the Ubiquiti Discovery service and helps determine the version number;
  • vulners - sends queries to the database Vulners, to check for vulnerabilities based on the service and application version defined when Nmap was launched.

Source: opennet.ru

Add a comment