head	1.88;
access;
symbols
	RELEASE_8_3_0:1.85
	RELEASE_9_0_0:1.83
	RELEASE_7_4_0:1.79
	RELEASE_8_2_0:1.79
	RELEASE_6_EOL:1.76
	RELEASE_8_1_0:1.75
	RELEASE_7_3_0:1.75
	RELEASE_8_0_0:1.74
	RELEASE_7_2_0:1.72
	RELEASE_7_1_0:1.70
	RELEASE_6_4_0:1.70
	RELEASE_5_EOL:1.69
	RELEASE_7_0_0:1.66
	RELEASE_6_3_0:1.66
	PRE_XORG_7:1.66
	RELEASE_4_EOL:1.66
	RELEASE_6_2_0:1.65
	RELEASE_6_1_0:1.63
	RELEASE_5_5_0:1.63
	RELEASE_6_0_0:1.57
	RELEASE_5_4_0:1.57
	RELEASE_4_11_0:1.56
	RELEASE_5_3_0:1.53
	RELEASE_4_10_0:1.48
	RELEASE_5_2_1:1.46
	RELEASE_5_2_0:1.46
	RELEASE_4_9_0:1.44
	RELEASE_5_1_0:1.42
	RELEASE_4_8_0:1.38
	RELEASE_5_0_0:1.38
	RELEASE_4_7_0:1.38
	RELEASE_4_6_2:1.37
	RELEASE_4_6_1:1.37
	RELEASE_4_6_0:1.37
	RELEASE_5_0_DP1:1.34
	RELEASE_4_5_0:1.33
	RELEASE_4_4_0:1.32
	RELEASE_4_3_0:1.26
	RELEASE_4_2_0:1.25
	RELEASE_4_1_1:1.25
	RELEASE_4_1_0:1.25
	RELEASE_3_5_0:1.25
	nmap_2_30_beta17:1.20
	nmap_2_30_beta18:1.21
	RELEASE_4_0_0:1.19
	RELEASE_3_4_0:1.16
	RELEASE_3_3_0:1.13
	nmap_2_2_beta4:1.12
	RELEASE_3_2_0:1.11
	nmap_2_12:1.11
	nmap_2_08:1.9
	nmap_2_11:1.10
	RELEASE_3_1_0:1.8
	nmap_2_07:1.8
	nmap_2_06:1.7
	nmap_2_05:1.6
	nmap_2_03:1.5
	nmap_2_02:1.4
	nmap_2_01:1.3
	nmap_2_00:1.2
	RELEASE_2_2_8:1.1.1.1
	RELEASE_3_0_0:1.1.1.1
	nmap_1_51:1.1.1.1
	nmap_1_51_import:1.1.1.1
	OBRIEN:1.1.1;
locks; strict;
comment	@# @;


1.88
date	2013.01.06.21.11.41;	author svnexp;	state Exp;
branches;
next	1.87;

1.87
date	2012.06.24.15.54.18;	author ohauer;	state Exp;
branches;
next	1.86;

1.86
date	2012.05.24.16.30.43;	author ohauer;	state Exp;
branches;
next	1.85;

1.85
date	2012.03.10.12.31.25;	author ohauer;	state Exp;
branches;
next	1.84;

1.84
date	2012.01.04.16.47.52;	author ohauer;	state Exp;
branches;
next	1.83;

1.83
date	2011.10.04.17.17.47;	author ohauer;	state Exp;
branches;
next	1.82;

1.82
date	2011.09.23.20.29.18;	author ohauer;	state Exp;
branches;
next	1.81;

1.81
date	2011.07.01.13.23.23;	author ohauer;	state Exp;
branches;
next	1.80;

1.80
date	2011.02.13.19.36.36;	author ohauer;	state Exp;
branches;
next	1.79;

1.79
date	2011.01.30.17.15.07;	author ohauer;	state Exp;
branches;
next	1.78;

1.78
date	2011.01.22.16.43.18;	author ohauer;	state Exp;
branches;
next	1.77;

1.77
date	2011.01.07.20.51.25;	author ohauer;	state Exp;
branches;
next	1.76;

1.76
date	2010.09.03.21.16.38;	author ohauer;	state Exp;
branches;
next	1.75;

1.75
date	2010.01.31.00.50.26;	author miwi;	state Exp;
branches;
next	1.74;

1.74
date	2009.07.16.22.17.10;	author miwi;	state Exp;
branches;
next	1.73;

1.73
date	2009.07.05.22.24.15;	author miwi;	state Exp;
branches;
next	1.72;

1.72
date	2009.04.13.09.53.53;	author dhn;	state Exp;
branches;
next	1.71;

1.71
date	2008.09.24.14.47.04;	author miwi;	state Exp;
branches;
next	1.70;

1.70
date	2008.08.03.16.09.47;	author miwi;	state Exp;
branches;
next	1.69;

1.69
date	2008.05.06.13.26.10;	author miwi;	state Exp;
branches;
next	1.68;

1.68
date	2008.04.14.00.53.05;	author clsung;	state Exp;
branches;
next	1.67;

1.67
date	2008.03.14.21.30.23;	author miwi;	state Exp;
branches;
next	1.66;

1.66
date	2006.12.12.20.32.37;	author miwi;	state Exp;
branches;
next	1.65;

1.65
date	2006.07.08.05.32.00;	author clsung;	state Exp;
branches;
next	1.64;

1.64
date	2006.06.25.19.04.40;	author erwin;	state Exp;
branches;
next	1.63;

1.63
date	2006.02.10.23.42.16;	author krion;	state Exp;
branches;
next	1.62;

1.62
date	2006.02.02.08.13.19;	author krion;	state Exp;
branches;
next	1.61;

1.61
date	2005.12.14.08.46.55;	author barner;	state Exp;
branches;
next	1.60;

1.60
date	2005.12.07.09.52.33;	author tdb;	state Exp;
branches;
next	1.59;

1.59
date	2005.09.16.11.05.18;	author garga;	state Exp;
branches;
next	1.58;

1.58
date	2005.09.08.13.18.14;	author krion;	state Exp;
branches;
next	1.57;

1.57
date	2005.02.26.15.39.54;	author krion;	state Exp;
branches;
next	1.56;

1.56
date	2004.11.30.18.10.45;	author eik;	state Exp;
branches;
next	1.55;

1.55
date	2004.10.19.16.04.13;	author eik;	state Exp;
branches;
next	1.54;

1.54
date	2004.10.13.13.52.54;	author eik;	state Exp;
branches;
next	1.53;

1.53
date	2004.08.31.20.41.10;	author eik;	state Exp;
branches;
next	1.52;

1.52
date	2004.08.26.10.28.04;	author eik;	state Exp;
branches;
next	1.51;

1.51
date	2004.07.07.09.22.25;	author eik;	state Exp;
branches;
next	1.50;

1.50
date	2004.07.05.00.06.07;	author eik;	state Exp;
branches;
next	1.49;

1.49
date	2004.06.17.11.56.03;	author eik;	state Exp;
branches;
next	1.48;

1.48
date	2004.03.18.01.04.31;	author eik;	state Exp;
branches;
next	1.47;

1.47
date	2004.01.19.22.31.35;	author eik;	state Exp;
branches;
next	1.46;

1.46
date	2003.10.07.22.31.18;	author edwin;	state Exp;
branches;
next	1.45;

1.45
date	2003.09.25.16.19.24;	author leeym;	state Exp;
branches;
next	1.44;

1.44
date	2003.07.01.03.38.03;	author foxfair;	state Exp;
branches;
next	1.43;

1.43
date	2003.06.16.04.43.50;	author leeym;	state Exp;
branches;
next	1.42;

1.42
date	2003.04.29.22.04.56;	author adamw;	state Exp;
branches;
next	1.41;

1.41
date	2003.04.28.18.28.23;	author adamw;	state Exp;
branches;
next	1.40;

1.40
date	2003.04.22.00.06.04;	author adamw;	state Exp;
branches;
next	1.39;

1.39
date	2003.04.11.10.00.50;	author sumikawa;	state Exp;
branches;
next	1.38;

1.38
date	2002.08.05.20.57.12;	author pat;	state Exp;
branches;
next	1.37;

1.37
date	2002.05.21.16.26.04;	author dwcjr;	state Exp;
branches;
next	1.36;

1.36
date	2002.04.29.06.33.34;	author obrien;	state Exp;
branches;
next	1.35;

1.35
date	2002.04.02.19.49.58;	author obrien;	state Exp;
branches;
next	1.34;

1.34
date	2002.03.21.01.39.49;	author obrien;	state Exp;
branches;
next	1.33;

1.33
date	2001.11.07.15.41.14;	author obrien;	state Exp;
branches;
next	1.32;

1.32
date	2001.08.10.15.15.04;	author obrien;	state Exp;
branches;
next	1.31;

1.31
date	2001.07.29.04.37.24;	author obrien;	state Exp;
branches;
next	1.30;

1.30
date	2001.07.20.18.27.06;	author obrien;	state Exp;
branches;
next	1.29;

1.29
date	2001.07.09.12.22.03;	author obrien;	state Exp;
branches;
next	1.28;

1.28
date	2001.06.04.15.27.38;	author obrien;	state Exp;
branches;
next	1.27;

1.27
date	2001.06.02.19.06.37;	author obrien;	state Exp;
branches;
next	1.26;

1.26
date	2001.03.20.16.39.14;	author obrien;	state Exp;
branches;
next	1.25;

1.25
date	2000.05.09.16.04.13;	author obrien;	state Exp;
branches;
next	1.24;

1.24
date	2000.05.05.01.51.05;	author obrien;	state Exp;
branches;
next	1.23;

1.23
date	2000.04.30.09.46.43;	author obrien;	state Exp;
branches;
next	1.22;

1.22
date	2000.04.18.18.58.20;	author obrien;	state Exp;
branches;
next	1.21;

1.21
date	2000.04.06.22.16.15;	author obrien;	state Exp;
branches;
next	1.20;

1.20
date	2000.03.27.01.23.43;	author obrien;	state Exp;
branches;
next	1.19;

1.19
date	2000.01.28.10.01.41;	author obrien;	state Exp;
branches;
next	1.18;

1.18
date	2000.01.17.09.22.13;	author obrien;	state Exp;
branches;
next	1.17;

1.17
date	2000.01.04.08.00.17;	author obrien;	state Exp;
branches;
next	1.16;

1.16
date	99.12.07.22.06.56;	author obrien;	state Exp;
branches;
next	1.15;

1.15
date	99.11.21.23.09.22;	author obrien;	state Exp;
branches;
next	1.14;

1.14
date	99.09.20.04.51.19;	author obrien;	state Exp;
branches;
next	1.13;

1.13
date	99.09.07.10.48.48;	author obrien;	state Exp;
branches;
next	1.12;

1.12
date	99.07.22.18.33.42;	author obrien;	state Exp;
branches;
next	1.11;

1.11
date	99.04.04.22.54.45;	author obrien;	state Exp;
branches;
next	1.10;

1.10
date	99.04.03.09.32.24;	author obrien;	state Exp;
branches;
next	1.9;

1.9
date	99.02.17.11.43.23;	author obrien;	state Exp;
branches;
next	1.8;

1.8
date	99.02.11.07.47.28;	author flathill;	state Exp;
branches;
next	1.7;

1.7
date	99.02.08.18.56.37;	author obrien;	state Exp;
branches;
next	1.6;

1.6
date	99.02.08.11.58.17;	author obrien;	state Exp;
branches;
next	1.5;

1.5
date	99.01.28.12.41.21;	author obrien;	state Exp;
branches;
next	1.4;

1.4
date	98.12.29.21.50.12;	author obrien;	state Exp;
branches;
next	1.3;

1.3
date	98.12.17.13.26.18;	author obrien;	state Exp;
branches;
next	1.2;

1.2
date	98.12.15.11.18.31;	author obrien;	state Exp;
branches;
next	1.1;

1.1
date	98.08.04.17.59.51;	author obrien;	state Exp;
branches
	1.1.1.1;
next	;

1.1.1.1
date	98.08.04.17.59.51;	author obrien;	state Exp;
branches;
next	;


desc
@@


1.88
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/310010
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
## SVN ##
## SVN ## ------------------------------------------------------------------------
## SVN ## r310010 | ohauer | 2013-01-06 18:42:38 +0000 (Sun, 06 Jan 2013) | 24 lines
## SVN ##
## SVN ## - update nmap to version 6.25
## SVN ## - fix build with clang and stdlib=libc++ [1]
## SVN ##
## SVN ## Nmap 6.25 [2012-11-29]
## SVN ## o [NSE]	Added CPE to smb-os-discovery output.
## SVN ##
## SVN ## o [Ncat] Fixed the printing of warning messages	for large arguments to
## SVN ##   the -i and -w	options. [Michal Hlavinka]
## SVN ##
## SVN ## o [Ncat] Shut down the write part of connected sockets in listen mode
## SVN ##   when stdin hits EOF, just as was already done	in connect mode.
## SVN ##   [Michal Hlavinka]
## SVN ##
## SVN ## o [NSE]	Added new fingerprints for http-enum: Sitecore,	Moodle,	typo3,
## SVN ##   SquirrelMail,	RoundCube. [Jesper K?\195?\188ckelhahn]
## SVN ##
## SVN ## o Added	some new checks	for failed library calls. [Bill	Parker]
## SVN ##
## SVN ## PR:		172358
## SVN ## 		174817
## SVN ##
## SVN ## Submitted by:	arrowdodger <6yearold@@gmail.com> [1]
## SVN ## 		Anders N. <wicked@@baot.se> (general update request)
## SVN ##
## SVN ## ------------------------------------------------------------------------
## SVN ##
@
text
@SHA256 (nmap-6.25.tar.bz2) = 3349cc6d36b86b95ca2b8075d16615a3a598cef494920d6652f9a8bf9f7660b5
SIZE (nmap-6.25.tar.bz2) = 7668639
@


1.87
log
@- update nmap to version 6.0.1

Announcement: http://seclists.org/nmap-hackers/2012/3
Changelog:    http://nmap.org/changelog.html

Some relevant changes in 6.01:

o Fixed a bug that caused Nmap to fail to find any network interface when
  at least one of them is in the monitor mode. The fix was to define the
  ARP_HRD_IEEE80211_RADIOTAP 802.11 radiotap header identifier in the
  libdnet-stripped code. Network interfaces that are in this mode are used
  by radiotap for 802.11 frame injection and reception. The bug was
  reported by Tom Eichstaedt and Henri Doreau.
  http://seclists.org/nmap-dev/2012/q2/449
  http://seclists.org/nmap-dev/2012/q2/478
  [Djalal Harouni, Henri Doreau]

o Fixed the greppable output of hosts that time-out (when --host-timeout was
  used and the host timed-out after something was received from that host).
  This issue was reported by Matthew Morgan. [jah]
@
text
@d1 2
a2 2
SHA256 (nmap-6.01.tar.bz2) = 77f6635b677d28b546cbef97e4ead6c2d4a5aebcaa108fe3a3c135db6448617a
SIZE (nmap-6.01.tar.bz2) = 21640157
@


1.86
log
@- update to version 6.00

Changelog:
==========
Nmap 6.00

o Most important release since Nmap 5.00 in July 2009! For a list of
  the most significant improvements and new features, see the
  announcement at: http://nmap.org/6

o In XML output, <osclass> elements are now child elements of the
  <osmatch> they belong to. Old output was thus:
    <os><osclass/><osclass/>...<osmatch/><osmatch/>...</os>
  New output is:
    <os><osmatch><osclass/><osclass/>...</osmatch>...</os>
  The option --deprecated-xml-osclass restores the old output, in case
  you use an Nmap XML parser that doesn't understand the new
  structure. The xmloutputversion has been increased to 1.04.

o Added a new <target> element to XML output that indicates when a
  target specification was ignored, perhaps because of a syntax error
  or DNS failure. It looks like this:
    <target specification="1.2.3.4.5" status="skipped" reason="invalid"/>
  [David Fifield]

o [NSE] Added the script samba-vuln-cve-2012-1182 which detects the
  SAMBA pre-auth remote root vulnerability (CVE-2012-1182).
  [Aleksandar Nikolic]

o [NSE] Added http-vuln-cve2012-1823.nse, which checks for PHP CGI
  installations with a remote code execution vulnerability. [Paulino
  Calderon]

o [NSE] Added script targets-ipv6-mld that sends a malformed ICMP6 MLD Query
  to discover IPv6 enabled hosts on the LAN. [Niteesh Kumar]

o [NSE] Added rdp-vuln-ms12-020.nse by Aleksandar Nikolic. This tests
  for two Remote Desktop vulnerabilities, including one allowing
  remote code execution, that were fixed in the MS12-020 advisory.

o [NSE] Added a stun library and the scripts stun-version and stun-info, which
  extract version information and the external NAT:ed address.
  [Patrik Karlsson]

o [NSE] Added the script duplicates which attempts to determine duplicate
  hosts by analyzing information collected by other scripts. [Patrik Karlsson]

o Fixed the routing table loop on OS X so that on-link routes appear.
  Previously, they were ignored so that things like ARP scan didn't
  work. [Patrik Karlsson, David Fifield]

o Upgraded included libpcap to version 1.2.1.

o [NSE] Added ciphers from RFC 5932 and Fortezza-based ciphers to
  ssl-enum-ciphers.nse. The patch was submitted by Darren McDonald.

o [NSE] Renamed hostmap.nse to hostmap-bfk.nse.

o Fixed a compilation problem on Solaris 9 caused by a missing
  definition of IPV6_V6ONLY. Reported by Dagobert Michelsen.

o Setting --min-parallelism by itself no longer forces the maximum
  parallelism to the same value. [Chris Woodbury, David Fifield]

o Changed XML output to show the "service" element whenever a tunnel
  is discovered for a port, even if the service behind it was unknown.
  [Matt Foster]

o [Zenmap] Fixed a crash that would happen in the profile editor when
  the script.db file doesn't exist. The bug was reported by Daniel
  Miller.

o [Zenmap] It is now possible to compare scans having the same name or
  command line parameters. [Jah, David Fifield]

o Fixed an error that could occur with ICMPv6 probes and -d4 debugging:
  "Unexpected probespec2ascii type encountered" [David Fifield]

o [NSE] Added new script http-chrono, which measures min, max and average
  response times of web servers. [Ange Gutek]

o Applied a workaround to make pcap captures work better on Solaris
  10. This involves peeking at the pcap buffer to ensure that captures
  are not being lost. A symptom of the previous behavior was that,
  when doing ARP host discovery against two targets, only one would be
  reported as up. [David Fifield]

o Fixed a bug that could cause Nsock timers to fire too early. This
  could happen for the timed probes in IPv6 OS detection, causing an
  incorrect measurement of the TCP_ISR feature. [David Fifield]

o [Zenmap] We now build on Windows with a newer version of PyGTK, so
  copy and paste should work again.

o Changed the way timeout calculations are made in the IPv6 OS engine.
  In rare cases a certain interleaving of probes and responses would
  result in an assertion failure.
@
text
@d1 2
a2 2
SHA256 (nmap-6.00.tar.bz2) = 9037b49ffde13a228ce4ffadd3de8320580f84a0cd8ac14b2fd74757f1fb4b26
SIZE (nmap-6.00.tar.bz2) = 21639906
@


1.85
log
@- update to version 5.61TEST5

small snippet from changelog:
 http://nmap.org/changelog.html

 o Integrated all of your IPv4 OS fingerprint submissions since June 2011 (about 1,900 of them)
   Added about 256 new fingerprints (total 3,572)
 o Integrated all of your service/version detection fingerprints submitted since November 2010
   (signature count increased to 7,423)
 o Integrated your latest IPv6 OS submissions and corrections
 o [NSE] Added 43(!) NSE scripts, bringing the total up to 340
 o [NSE] Added 14 new protocol libraries
 o [CPE] (Common Platform Enumeration) OS classification is now supported for IPv6 OS detection
 o Added a new --script-args-file option
 o [NSE] Added support for decoding EIGRP broadcasts from Cisco routers to broadcast-listener
 o [NSE] Added redirect support to the http library
 o Update to the latest MAC address prefix assignments from IEEE as of March 8, 2012

Test builds sponsored by redports.org

Feature safe: yes
@
text
@d1 2
a2 2
SHA256 (nmap-5.61TEST5.tar.bz2) = 048fb618dd02e9003280a10a7fe0584b70f47a4220583ad575c8acee31a0a465
SIZE (nmap-5.61TEST5.tar.bz2) = 21500913
@


1.84
log
@- update to 5.61TEST4

For detailed Changes see http://nmap.org/changelog.html
(List is simply to long ...)

Some highlights
* [NSE] Added a new httpspider library which is used for recursively
  crawling web sites for information.  New scripts using this
  functionality include http-backup-finder, http-email-harvest,
  http-grep, http-open-redirect, and http-unsafe-output-escaping. See
  http://nmap.org/nsedoc/ or the list later in this file for details
  on these.

* [NSE] Added a vulnerability management library (vulns.lua) to store and to
  report discovered vulnerabilities.

* [NSE] Added a new script force feature.  You can force scripts to
  run against target ports (even if the "wrong" service is detected)
  by placing a plus in front of the script name passed to --script.
  See http://nmap.org/book/nse-usage.html#nse-script-selection.

* [NSE] Added 51(!) NSE scripts, bringing the total up to 297.

Build tests sponsored by redports.org
@
text
@d1 2
a2 2
SHA256 (nmap-5.61TEST4.tar.bz2) = b914d42dd578ffd711e6e5a8ea136acbe367c356c03c967811e76bd24a1923ae
SIZE (nmap-5.61TEST4.tar.bz2) = 21757047
@


1.83
log
@- update to version 5.61TEST2
- add workaround for system build with WITHOUT_INET6 [1]

 Thanks to Kim Scarborough for sharing the libpcap workaround

PR:		ports/159376 [1]
Submitted by:	Alexander Panyushkin [1]
@
text
@d1 2
a2 2
SHA256 (nmap-5.61TEST2.tar.bz2) = 8b086eba391e306bcb99750a757abe016651b817b4fde046b0e1ea91c5455ee0
SIZE (nmap-5.61TEST2.tar.bz2) = 21633731
@


1.82
log
@ - update to 5.61TEST1

Here is the (partial) CHANGELOG since 5.59BETA1:

Nmap 5.61TEST1 [2011-09-19]

o The changelog entries below for this test release are not yet
  finished or comprehensive.  We'll update them soon.

o [Ncat] Updated ca-bundle.crt (primarily to remove DigiNotar).

o Fixed compilation on OS X 10.7 Lion. Thanks to Patrik Karlsson and
  Babak Farroki for researching fixes.

o [NSE] Fixed SSL compressor names in ssl-enum-ciphers.nse, and
  removed redundant multiple listings of the NULL compressor.
  [Matt Selsky]

o [NSE] Added cipher strength ratings to ssl-enum-ciphers.nse.
  [Gabriel Lawrence]

o Added Common Platform Enumeration (CPE, http://cpe.mitre.org/)
  output for OS and service versions. These show up in normal output
  with the headings "OS CPE:" and "Service Info:":
    OS CPE: cpe:/o:linux:kernel:2.6.39
    Service Info: OS: Linux; CPE: cpe:/o:linux:kernel
  These also appear in XML output, which additionally has CPE entries
  for service versions. [David, Henri]

o [NSE] Added new default credential list for Oracle and modified the
  oracle-brute script to make use of it. [Patrik]

o [NSE] Added xmpp-info.nse as a replacement for xmpp.nse. This updated version
  brings new features and fixes. [Vasiliy Kulikov]

o Fixed RPC scan for 64-bit architectures by using fixed-size data
  types. [David]

o Relaxed the XML DTD to allow validation of files where the verbosity
  level changed during the scan. [Daniel Miller]

o Made a service confidence of 8 (used when tcpwrapped) and indeed any
  number between 0 and 10 be legal in XML output according to the DTD.
  [Daniel Miller]

o [NSE] Added three scripts that do host discovery on local IPv6
  subnets. Each of them uses a different multicast technique, meaning
  that even very large networks have host discovery done without
  needing to probe every address individually.
  + targets-multicast-ipv6-echo: Sends a multicast echo request, like
    broadcast-ping does for IPv4.
  + targets-multicast-ipv6-invalid-dst: Sends an invalid packet that
    can elicit an ICMPv6 Parameter Problem response.
  + targets-multicast-ipv6-slaac: Sends a phony router advertisement,
    which causes hosts to allocate a temporary address and then send a
    packet to discover if anyone else is using the address.
  [Weilin, David]

o [NSE] Added functions to packet.lua to make it easier to build IPv6
  packets. [Weilin]

o [NSE] Added new script http-vuln-cve2011-3192 which checks whether an instance
  of Apache is vulnerable to a DoS attack exploiting the byterange filter.
  [Duarte Silva].

o [NSE] Fixed authentication problems in the TNS library that would prevent
  authentication from working against Oracle 11.2.0.2.0 XE [Chris Woodbury]

o Removed some restrictions on probe matching that, for example,
  prevented a RST/ACK reply from being recognized in a NULL scan. This
  was found and fixed by Matthew Stickney and Joe McEachern.

o Rearranged some characters classes in service matches to avoid any
  that look like POSIX collating symbols ("[.xyz.]"). John Hutchison
  discovered this error caused by one of the match lines:
    InitMatch: illegal regexp: POSIX collating elements are not supported
  [Daniel Miller]

o [NSE] Added the address-info.nse script, which shows extra information about IP addresses.

o [NSE] Added scripts http-joomla-brute, http-wordpress-brute, http-wp-enum and
  http-awstatstotal-exec. [Paulino]

o [Zenmap] Fixed zenmap deleting ports based on newer scans which did
  not actually scan the port in question. Additionally ncat now only
  updates ports with new information if the new information is the same
  protocol. Not just the same port. [Colin Rice]

o [Ncat] Fixed ncat crashing with --ssl-verify -vvv on windows. [Colin Rice]

o [NSE] Added script http-waf-detect. This script tries to determine
  if an IDS/IPS/WAF is protecting a web server. [Paulino]

o [NSE] Added the bittorrent library and bittorrent-discovery script which
  enables us to discover peers and nodes for a particular torrent file or
  magnet link.

o [NSE] Added basic query support to the Oracle TNS library making it possible
  for scripts to query the database server using SQL. [Patrik]

o [Ncat] Added --append-output option, that when used along with -o and/or -x
  prevents clobbering(truncating) an existing file. [Shinnok]

o [NSE] Added script broadcast-listener that attempts to discover hosts by
  passively listening to the network. It does so by decoding ethernet and IP
  broadcast and multicast messages. [Patrik]

o Fixed a bug that would make Nmap segfault if it failed to open an interface
  using pcap. The bug details and patch are posted here:
  http://seclists.org/nmap-dev/2011/q3/365 [Patrik]

o Ncat SCTP mode supports connection brokering now(--sctp --broker). [Shinnok]

o Nmap now defers options parsing until it has read through all the command line
  arguments. You can now use options like -S with an IPv6 address before
  specifying -6 at the command line, which previously got you an error.
  [Shinnok]

o [NSE] Added the library xmpp.lua and the script xmpp-brute that performs
  brute force password auditing against XMPP (Jabber) servers. [Patrik]

o [NSE] Fixed a bug in the ssh2-enum-algos script that would prevent it from
  displaying any output unless run in debug mode. [Patrik]

o [NSE] Fixed the nsedebug print_hex() function so it does not print an
  empty line if there are no remaining characters, and improved its NSEDoc.
  [Chris Woodbury].

o [NSE] Added the scripts http-axis2-dir-traversal and
  http-litespeed-sourcecode-download that exploits a directory traversal and
  null byte poisoning vulnerabilities in Apache Axis2 and LiteSpeed Web Server
  respectively. [Paulino]

o [Ncat] Ncat now no longer blocks while an ssl handshake is taking place or
  waiting to complete. [Shinnok]

o [NSE] Added the script broadcast-dhcp-discover that sends a DHCP discover
  message to the broadcast address and collects and reports the network
  information received from the DHCP server. [Patrik]

o [NSE] Added the script smtp-brute that performs brute force password
  auditing against SMTP servers. [Patrik]

o [NSE] Updated SMTP library to support authentication using both plain-text
  and the SASL library. [Patrik]

o [NSE] Added the script imap-brute that performs brute force password
  auditing against IMAP servers. [Patrik]

o [NSE] Updated IMAP library to support authentication using both plain-text
  and the SASL library. [Patrik]

o [NSE] Added SASL library created by Djalal Harouni and Patrik Karlsson
  providing common code for "Simple Authentication and Security Layer" to
  services supporting it. The algorithms supported by the library are:
  PLAIN, CRAM-MD5, DIGEST-MD5 and NTLM. [Patrik Karlsson, Djalal Harouni]

o [NSE] Added scripts cvs-brute.nse, cvs-brute-repository.nse and the cvs
  library. The cvs-brute-repository script allows for guessing possible
  repository names needed in order to perform password guessing using the
  cvs-brute.nse script. [Patrik]

o [Zenmap] The Zenmap crash handler now instructs you to mail in crash
  information to nmap-dev. [Colin Rice]

o Added IPv6 Neighbor Discovery ping. This is the IPv6 analog to IPv4
  ARP scan. It is the default ping type for local IPv6 networks.
  [Weilin]

o [NSE] Added smtp-vuln-cve2011-1764 script, which checks if the Exim
  SMTP server is vulnerable to the DKIM Format String vulnerability
  (CVE-2011-1764). [Djalal]

o Added the broadcast-ping script which sends icmp packets to broadcast
  addresses on the selected network interface, or all ethernet interfaces if
  none is selected. It has the option to add the discovered hosts as targets.

o [NSE] Applied patch from Chris Woodbury that adds the following additional
  information to the output of smb-os-discovery:
  + Forest name
  + FQDN
  + NetBIOS computer name
  + NetBIOS domain name

o [Ncat] Ncat now supports IPV6 addresses by default without the -6 flag.
  Additionally ncat listens on both :: and localhost when passed
  -l, or any other listening mode unless a specific listening address is
  supplied.

o [NSE] Split script db2-discover into two scripts, adding a new
  broadcast-db2-discover script. This script attempts to discover DB2
  database servers through broadcast requests. [Patrik Karlsson]

o Fixed broken XML output in the case of timed-out hosts; the
  enclosing host element was missing. The fix was suggested by Rmi
  Mollon.

o [NSE] Added ftp-vuln-cve2010-4221 script, which checks if the ProFTPD
  server is vulnerable to the Telnet IAC stack overflow vulnerability
  (CVE-2010-4221). [Djalal]

o [NSE] Added ftp-vsftpd-backdoor, which detects a backdoor that was introduced
  into vsftpd-2.3.4 source code distributions. [Daniel Miller]

o [NSE] ldap-brute.nse - Multiple changes:
  + Added support for 2008 R2 functional level Active Directory instances
    to ldap-brute.
  + Added detection for valid credentials where the target account was
    expired or limited by time or login host constraints.
  + Added support for specifying a UPN suffix to be appended to usernames
    when brute forcing Microsoft Active Directory accounts.
  + Added support for saving discovered credentials to a CSV file.
  + Now reports valid credentials as they are discovered when the script
    is run with -vv or higher.
	[Tom Sellers]

o [NSE] ldap-search.nse - Added support for saving search results to
  CSV.  This is done by using the ldap.savesearch script argument to
  specify an output filename prefix.  [Tom Sellers]

o [NSE] Updated smb-brute to add detection for valid credentials where the
  target account was expired or limited by time or login host constraints.
  [Tom Sellers]

o [NSE] Updated account status text in brute force password discovery
  scripts in an effort to make the reporting more consistent across
  all scripts.  This will have an impact on any code that parses these
  values.  [Tom Sellers]
@
text
@d1 2
a2 2
SHA256 (nmap-5.61TEST1.tar.bz2) = c87e98c4d0493b02e50a43979f3a9e7ee411c50dec695e92b0b6c1a8eb539f1c
SIZE (nmap-5.61TEST1.tar.bz2) = 21616904
@


1.81
log
@- update to version 5.59BETA1

This version includes:
 o 40 new NSE scripts (plus improvements to many others)
 o even more IPv6 goodness than our informal World IPv6 Day release
 o 7 new NSE protocol libraries
 o hundreds of bug fixes
 o and much more see http://seclists.org/nmap-hackers/2011/3
@
text
@d1 2
a2 2
SHA256 (nmap-5.59BETA1.tar.bz2) = c43d9b93431b47d4e8c0cfa1812ff655b2b84ed30d25b5494ea7f1692a1ad782
SIZE (nmap-5.59BETA1.tar.bz2) = 21306127
@


1.80
log
@ - update to version 5.51

Nmap 5.51 [2011-02-11]

o [Ndiff] Added support for prerule and postrule scripts. [David]

o [NSE] Fixed a bug which caused some NSE scripts to fail due to the
  absence of the NSE SCRIPT_NAME environment variable when loaded.
  Michael Pattrick reported the problem. [Djalal]

o [Zenmap] Selecting one of the scan targets in the left pane is
  supposed to jump to that host in the Nmap Output in the right pane
  (but it wasn't).  Brian Krebs reported this bug. [David]

o Fixed an obscure bug in Windows interface matching. If the MAC
  address of an interface couldn't be retrieved, it might have been
  used instead of the correct interface. Alexander Khodyrev reported
  the problem.  [David]

o [NSE] Fixed portrules in dns-zone-transfer and ftp-proftpd-backdoor
  that used shortport functions incorrectly and always returned
  true. [Jost Krieger]

o [Ndiff] Fixed ndiff.dtd to include two elements that can be diffed:
  status and address. [Daniel Miller]

o [Ndiff] Fixed the ordering of hostscript-related elements in XML
  output. [Daniel Miller]

o [NSE] Fixed a bug in the nrpe-enum script that would make it run for
  every port (when it was selected--it isn't by default).  Daniel
  Miller reported the bug. [Patrick]

o [NSE] When an NSE script sets a negative socket timeout, it now
  causes a controlled Lua stack trace instead of a fatal error.
  Vlatko Kosturjak reported the bug. [David]

o [Zenmap] Worked around an error that caused the py2app bootstrap
  executable to be non-universal even when the rest of the application
  was universal. This prevented the binary .dmg from working on
  PowerPC. Yxynaxen reported the problem. [David]

o [Ndiff] Fixed an output line that wasn't being redirected to a file
  when all other output was. [Daniel Miller]
@
text
@d1 2
a2 2
SHA256 (nmap-5.51.tar.bz2) = 15b3e134a74fa9b54aba2c3a53d6701c7ad221dc4051657ef95465a5a5a8687e
SIZE (nmap-5.51.tar.bz2) = 16869068
@


1.79
log
@- update to version 5.50
- always enable bpf in libdnet-stripped to support build in Jail [1]

Announcement and Changelog are very long and covered by last updates.

Announcement: http://seclists.org/nmap-hackers/2011/0
Changelog: http://nmap.org/changelog.html

PR:		ports/154353 [1]
Submitted by:	Mars G Miro <spry _at_ anarchy.in.the.ph> [1]
Feature safe:	yes
@
text
@d1 2
a2 2
SHA256 (nmap-5.50.tar.bz2) = aa044113caa47e172c154daed73afc70ffa18d359eb47c22a9ea85ffcb14ffb8
SIZE (nmap-5.50.tar.bz2) = 16877762
@


1.78
log
@ - update nmap to version 5.36TEST4

   Changelog: http://nmap.org/changelog.html

Feature safe:	yes
@
text
@d1 2
a2 2
SHA256 (nmap-5.36TEST4.tar.bz2) = 6176389cc98e3a4664c18f5726387c816a0761be4807605112981d02c8787a64
SIZE (nmap-5.36TEST4.tar.bz2) = 16865819
@


1.77
log
@ - update nmap to version 5.36TEST3
 - remove dead mirror servers

 Changelog: http://nmap.org/changelog.html

 Mayjor changes are NSE script related, some highlihts:
  o [NSE] Added stuxnet-detect.nse
  o [NSE] Added the ftp-proftpd-backdoor.nse

  and many more interesting NSE scripts.
@
text
@d1 2
a2 2
SHA256 (nmap-5.36TEST3.tar.bz2) = c722f6f811f224aaba84047a05c6c4874dd683709c06f1c82cf414a1e94bd162
SIZE (nmap-5.36TEST3.tar.bz2) = 16830247
@


1.76
log
@ - update nmap to version 5.35DC1
 - remove MD2 code from nse_openssl.cc (already removed in nmap svn)
 - remove naming conflict if openssl-1.x is build with SCTP support

Approved by:	glarkin (mentor)
@
text
@d1 2
a2 3
MD5 (nmap-5.35DC1.tar.bz2) = 5bc2f8629f26716aa78d4bfe474a5d3a
SHA256 (nmap-5.35DC1.tar.bz2) = 51a6cde0a6afee50799d59b1968f1a4011753bb535f070114fd60be62f59ad44
SIZE (nmap-5.35DC1.tar.bz2) = 11302092
@


1.75
log
@- Update to 5.21

PR:		143331
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d1 3
a3 3
MD5 (nmap-5.21.tar.bz2) = f77fa51d89ab27d35e5cd87bb086b858
SHA256 (nmap-5.21.tar.bz2) = 9fcb24f86157541c2f17cc8a0cc1e5d15d909b51720d163fcad5faaa6201b0ba
SIZE (nmap-5.21.tar.bz2) = 10015121
@


1.74
log
@- Update to 5.00

Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d1 3
a3 3
MD5 (nmap-5.00.tar.bz2) = 32d27de32166c02d670bb4a086185886
SHA256 (nmap-5.00.tar.bz2) = b88b987d6e81ed306c4a8c52c6d6be414feac51ca50e1a61777f162dc3e8214d
SIZE (nmap-5.00.tar.bz2) = 9068342
@


1.73
log
@- Update to 4.90RC1

PR:		136295
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d1 3
a3 3
MD5 (nmap-4.90RC1.tar.bz2) = 4355574dfdc3f86bfa85be0a6d9b5bf4
SHA256 (nmap-4.90RC1.tar.bz2) = 92c02b6caf4781ff1ccaa24548ed1c7a599ea3616d57bfb496f93a2221d58723
SIZE (nmap-4.90RC1.tar.bz2) = 9028130
@


1.72
log
@- Update to 4.85.b7

PR:		ports/133547
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
Approved by:	miwi (mentor)
@
text
@d1 3
a3 3
MD5 (nmap-4.85BETA7.tar.bz2) = 49218e9a5ec7b2628334b911a885b432
SHA256 (nmap-4.85BETA7.tar.bz2) = dfff90a51fa44770a48dbeb31378d090ee334e4df2d013c8934f6ebf33eaabe5
SIZE (nmap-4.85BETA7.tar.bz2) = 6454664
@


1.71
log
@- Update to 4.76

PR:		127379
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d1 3
a3 3
MD5 (nmap-4.76.tar.bz2) = 278dd2e849cc3dbb947df961a1aaffd0
SHA256 (nmap-4.76.tar.bz2) = 4e24328ca6ec97afb2a8caf312b1f111a15cf41763a5ac41e7a633fdb217d66d
SIZE (nmap-4.76.tar.bz2) = 6061317
@


1.70
log
@- Update to 4.68

PR:		126211
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d1 3
a3 3
MD5 (nmap-4.68.tar.bz2) = c363d32a00c697d15996fced22072b6c
SHA256 (nmap-4.68.tar.bz2) = 1866be3d8d397ea7721c08f520d033c208492d3e1551311805d18efbe6cef161
SIZE (nmap-4.68.tar.bz2) = 5979048
@


1.69
log
@- Update to 4.62

PR:		123401
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d1 3
a3 3
MD5 (nmap-4.62.tar.bz2) = 4fdaa418f4008509d4c91ec087131d4e
SHA256 (nmap-4.62.tar.bz2) = 2fb7b72c1416428dd786f37e3aab0b36f633ee5246dd7a1b0240b0a5f9e13791
SIZE (nmap-4.62.tar.bz2) = 3308006
@


1.68
log
@- Update nmap to 4.60 and fix moved MASTER_SITES.
  Also fixed portlint warnings about Makefile structure.

PR:		ports/122728
Submitted by:	maintainer (Daniel Roethlisberge)
@
text
@d1 3
a3 3
MD5 (nmap-4.60.tar.bz2) = 6201551054050c11182fd6dd91682cb1
SHA256 (nmap-4.60.tar.bz2) = 1c0c6a055761ac2952de49585a6d7209fdbc83aa8a88c8f7f736576a90571cca
SIZE (nmap-4.60.tar.bz2) = 3213870
@


1.67
log
@- Update to 4.52

PR:		119673
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d1 3
a3 3
MD5 (nmap-4.52.tar.bz2) = 4f965a89e4e724d266dd9235c485633f
SHA256 (nmap-4.52.tar.bz2) = ec44e89f12bb1c140e9e580f2ceee8950caa03537cf74f5718b25b19a476589a
SIZE (nmap-4.52.tar.bz2) = 3147364
@


1.66
log
@- Update to 4.20

PR:		ports/106567
Submitted by:	Jose Fernandes<jose@@diasfernandes.pt>
Approved by:    maintainer
@
text
@d1 3
a3 3
MD5 (nmap-4.20.tar.bz2) = ea50419f99472200c4184a304e3831ea
SHA256 (nmap-4.20.tar.bz2) = c923a6cfa6d3683dc7ee27a721c19d15fd66f264f8ca6dbc9cfac710591f32a8
SIZE (nmap-4.20.tar.bz2) = 2156077
@


1.65
log
@- update to 4.11

PR:		ports/99833
Submitted by:	tjs <tjs_AT_cdpa dot nsysu dot edu dot tw>
Approved by:	maintainer (Daniel Roethlisberger)
@
text
@d1 3
a3 3
MD5 (nmap-4.11.tar.bz2) = 69bdaa9995f32247b5da7c6b6c41df9b
SHA256 (nmap-4.11.tar.bz2) = 780b770c011afabb2eaf88b375940b5d3dbb742837dacb144ccc3cfa8cb0907e
SIZE (nmap-4.11.tar.bz2) = 2130457
@


1.64
log
@Update to 4.10

PR:		99461
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
@
text
@d1 3
a3 3
MD5 (nmap-4.10.tar.bz2) = 4c3fc7d227034892ade86892d8306b2a
SHA256 (nmap-4.10.tar.bz2) = b90411a0030a188580de26ec3fd791fee590a946e4d0ecc5a9eff6a1aa29427b
SIZE (nmap-4.10.tar.bz2) = 2130202
@


1.63
log
@Update to 4.01

PR:		ports/93153
Submitted by:	krion
Approved by:	maintainer
@
text
@d1 3
a3 3
MD5 (nmap-4.01.tar.bz2) = 09c259837b24f6c7385c2c1c49760a7c
SHA256 (nmap-4.01.tar.bz2) = 2b2cebaeee196dbf779cf7212b01dab8bb06b7e6807f45f3b62902bf84ffb58e
SIZE (nmap-4.01.tar.bz2) = 1895276
@


1.62
log
@Update to 4.00

PR:		ports/92684
Submitted by:	krion
Approved by:	maintainer
@
text
@d1 3
a3 3
MD5 (nmap-4.00.tar.bz2) = b409d632d753588f5691562209b83eed
SHA256 (nmap-4.00.tar.bz2) = bbcf97aa6afff3ff4485d6e060853d1a29e68965d0e79a6ae6c0e4a2a9fe370f
SIZE (nmap-4.00.tar.bz2) = 1896480
@


1.61
log
@Update nmap and nmapfe to 3.95.
Notable upstream changes:

 * new help/usage screen and man page
 * new man page currently only available in en, pt_PT and pt_BR
 * nmapfe is now a shiny GTK2 application

Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
PR:		ports/90371
@
text
@d1 3
a3 3
MD5 (nmap-3.95.tar.bz2) = a16e9d7f7912af7c93faa794bd63b6d1
SHA256 (nmap-3.95.tar.bz2) = ec48a1d9ae7d34bbcab61f75527a36fe5869581336e201d2ca8e9c680d3d5d2f
SIZE (nmap-3.95.tar.bz2) = 1923771
@


1.60
log
@- Add SHA256 checksum

PR:		90054
Submitted by:	Daniel Roethlisberger <daniel@@roe.ch> (maintainer)
Approved by:	clement (mentor)
@
text
@d1 3
a3 3
MD5 (nmap-3.93.tar.bz2) = 92e69a2e8db0eb59b5d71b8b363892f2
SHA256 (nmap-3.93.tar.bz2) = dec4f59383e459e30ba0f0dfbfc37311bef411f2d6a7eeeb16eec89c797939ec
SIZE (nmap-3.93.tar.bz2) = 2029943
@


1.59
log
@- Update to 3.93

PR:		ports/86113
Submitted by:	maintainer
@
text
@d2 1
@


1.58
log
@Update to version 3.90
@
text
@d1 2
a2 2
MD5 (nmap-3.90.tar.bz2) = 0288e464b5de54c5f8cea265474c0f72
SIZE (nmap-3.90.tar.bz2) = 1973930
@


1.57
log
@Update to version 3.81

PR:		ports/77425
Submitted by:	krion
Approved by:	maintainer timeout
@
text
@d1 2
a2 2
MD5 (nmap-3.81.tar.bz2) = 0713306dda85aee2c95ef31b4b7d2838
SIZE (nmap-3.81.tar.bz2) = 1491604
@


1.56
log
@update to version 3.77
@
text
@d1 2
a2 2
MD5 (nmap-3.77.tar.bz2) = 03f0a925fc1975862709579b452b30f9
SIZE (nmap-3.77.tar.bz2) = 1441332
@


1.55
log
@- update to version 3.75
  + updated OS fingerprint database
@
text
@d1 2
a2 2
MD5 (nmap-3.75.tar.bz2) = 1b54c0608b36f6b3ac92d7d1b910738f
SIZE (nmap-3.75.tar.bz2) = 1439720
@


1.54
log
@- update to version 3.71-PRE1
@
text
@d1 2
a2 2
MD5 (nmap-3.71-PRE1.tar.bz2) = 06dcf92f0dfa9dbb9efaa4d361e202fa
SIZE (nmap-3.71-PRE1.tar.bz2) = 1438166
@


1.53
log
@- update to version 3.70 (birthday edition, try the verbose mode)
@
text
@d1 2
a2 2
MD5 (nmap-3.70.tar.bz2) = b9a92e48324cd393edaef773b294f36b
SIZE (nmap-3.70.tar.bz2) = 1435675
@


1.52
log
@support building nmap-3.59a5 WITH_PRERELEASE=yes
@
text
@d1 2
a2 4
MD5 (nmap-3.55.tar.bz2) = 88b5f010f43b0e2ee0c2cfb468796aa9
SIZE (nmap-3.55.tar.bz2) = 1330164
MD5 (nmap-3.59ALPHA5.tar.bz2) = 6c5627918ce37d6192345a0ad997731b
SIZE (nmap-3.59ALPHA5.tar.bz2) = 1428996
@


1.51
log
@- update to 3.55
  /usr/local/share/doc/nmap/CHANGELOG
@
text
@d3 2
@


1.50
log
@update to 3.51-TEST4
@
text
@d1 2
a2 2
MD5 (nmap-3.51-TEST4.tar.bz2) = 6c1ffb13a8fc49f3783e27dd66f537d5
SIZE (nmap-3.51-TEST4.tar.bz2) = 1325396
@


1.49
log
@- update to 3.51-TEST3
- fix bug when ranges cross interface boundaries [1]

Notified by:	Alex Povolotsky <tarkhil@@webmail.sub.ru>, Mike Benjamin <mikeb@@mikeb.org> [1]
@
text
@d1 2
a2 2
MD5 (nmap-3.51-TEST3.tar.bz2) = d49f83863011957c51b3173af7b5c58d
SIZE (nmap-3.51-TEST3.tar.bz2) = 1336757
@


1.48
log
@SIZEify

Prompted by:	trevor
@
text
@d1 2
a2 2
MD5 (nmap-3.50.tar.bz2) = b4363f445a7c502cf314ae88ab71ec6c
SIZE (nmap-3.50.tar.bz2) = 1255501
@


1.47
log
@- update to version 3.50

Approved by:	marcus (mentor)
@
text
@d2 1
@


1.46
log
@[MAINTAINER] port security/nmap: update to version 3.48

	- improved version detection
	- integrates most FreeBSD fixes, thanks to
	  Marius Strobl <marius@@alchemy.franken.de>
	- install localized man pages

PR:		ports/57646
Submitted by:	Oliver Eikemeier <eikemeier@@fillmore-labs.com>
@
text
@d1 1
a1 1
MD5 (nmap-3.48.tar.bz2) = 8c38559a863efd476c5b042123f1ee3a
@


1.45
log
@update to nmap/nmapfe version 3.46

PR:		57196
Submitted by:	Oliver Eikemeier <eikemeier@@fillmore-labs.com>
@
text
@d1 1
a1 1
MD5 (nmap-3.46.tar.bz2) = 58974b2d4059752a9f66adc4659f7878
@


1.44
log
@PR:		53933
Submitted by:	maintainer
Reviewed by:
Approved by:
Obtained from:
MFC after:
1. Upgrade Nmap to 3.30, which released at Jun 29, 2003. Major enchancement is
   OS fingerprints update. The fingerprint DB now contains almost 1000
   fingerprints.

   See ChangeLog at this link:

	http://lists.insecure.org/lists/nmap-hackers/2003/Apr-Jun/0016.html

2. Renamed the patch files to be more descriptive.
@
text
@d1 1
a1 1
MD5 (nmap-3.30.tar.bz2) = 639fc1c91f48319eca97401e74f9c90e
@


1.43
log
@nmap 3.27 -> 3.28

PR:		53351
Submitted by:	Dominic Marks <dom@@cus.org.uk>
@
text
@d1 1
a1 1
MD5 (nmap-3.28.tar.bz2) = ac46d6d7a5f7eec8d0281f656c23f2b4
@


1.42
log
@Update to 3.27.

Submitted by:	Marius Strobl <marius@@alchemy.franken.de>
Reviewed by:	Dominic Marks <dom@@cus.org.uk> (maintainer)
@
text
@d1 1
a1 1
MD5 (nmap-3.27.tar.bz2) = 7dd965ee17397cb80775f226b0904010
@


1.41
log
@Update to 3.26.

PR:		51459
Submitted by:	Miguel Mendez <flynn@@energyhq.es.eu.org>
Approved by:	d.marks@@student.umist.ac.uk (maintainer)
@
text
@d1 1
a1 1
MD5 (nmap-3.26.tar.bz2) = 1a490c652152f72755947a40921c685b
@


1.40
log
@Update to 3.25.

PR:		51257
Submitted by:	Dominic Marks <dom@@cus.org.uk> (maintainer)
@
text
@d1 1
a1 1
MD5 (nmap-3.25.tar.bz2) = 667106a03d49716954328e60e0f6c007
@


1.39
log
@Upgrade to 3.20

PR:		ports/49987
Submitted by:	Dominic Marks <dom@@cus.org.uk>
		marius@@alchemy.franken.de
@
text
@d1 1
a1 1
MD5 (nmap-3.20.tar.bz2) = 00f42f5477cc2499f5f68479702dd224
@


1.38
log
@Update to 3.00

PR:		ports/41330
Submitted by:	maintainer
@
text
@d1 1
a1 1
MD5 (nmap-3.00.tgz) = 2b648bc66f1cedbeed230ef56f6549a8
@


1.37
log
@Update to the latest

PR:		38305
Submitted by:	maintainer
@
text
@d1 1
a1 1
MD5 (nmap-2.54BETA34.tgz) = be5f0784fe0a318c9b54c09ffa1b565b
@


1.36
log
@Update to version 2.54 Beta 33.
@
text
@d1 1
a1 1
MD5 (nmap-2.54BETA33.tgz) = 4d82a7feb1ef5865900a8843935a7f63
@


1.35
log
@Update to version 2.54 Beta 32.
@
text
@d1 1
a1 1
MD5 (nmap-2.54BETA32.tgz) = 866b1099534b2fca62286061f1414538
@


1.34
log
@Update to version 2.54 Beta 31.
@
text
@d1 1
a1 1
MD5 (nmap-2.54BETA31.tgz) = f0d363b32bab910ea195502322a43cca
@


1.33
log
@Update to version 2.54 Beta 30.
@
text
@d1 1
a1 1
MD5 (nmap-2.54BETA30.tgz) = c43117c4a8d9f8e636398b1efe6dd00f
@


1.32
log
@Update to version 2.54 Beta 29.

+ updated fingerprint database
+ multi-portlist -- specify different ranges for TCP & UDP
@
text
@d1 1
a1 1
MD5 (nmap-2.54BETA29.tgz) = 1673c0473592348163e665e673653caa
@


1.31
log
@Update to version 2.54 Beta 28.
@
text
@d1 1
a1 1
MD5 (nmap-2.54BETA28.tgz) = b4c45f118254a6a0abb4955cc24b7a79
@


1.30
log
@Update to version 2.54 Beta 27.
@
text
@d1 1
a1 1
MD5 (nmap-2.54BETA27.tgz) = 46bea19bacb265af7b1c2ff9c1e23ffe
@


1.29
log
@Update to version 2.54 Beta 26.

The coolest feature is a new scan type -- Idlescan!
The quick synopsis is that this is a completely blind scan (meaning no
packets are sent to the target from your real IP address).  Instead, a
unique side-channel attack exploits predictable "IP fragmentation ID"
sequence generation on the zombie host to glean information about the
open ports on the target.
@
text
@d1 1
a1 1
MD5 (nmap-2.54BETA26.tgz) = 9fa0305c82c53576f241dcc8d21b8b60
@


1.28
log
@Update to version 2.54 Beta 25.

-- Added a whole bunch of new OS fingerprints (and adjustments)
   ranging from big important ones (Linux 2.4.X, OpenBSD 2.9, FreeBSD
   4.3, Cisco 12.2.1, MacOS X, etc) to some that are more obscure (
   such as Apple Color LaserWriter 12/660 PS and VirtualAccess
   LinxpeedPro 120 )
-- Tweaked TCP Timestamp and IP.ID sequence classification algorithms
@
text
@d1 1
a1 1
MD5 (nmap-2.54BETA25.tgz) = 62442768fc3b2ed9856241baa2281dc8
@


1.27
log
@Upgrade to 2.54BETA24.

+ fixes a problem that kept UDP RPC scanning from working unless you were
  also doing a TCP scan.
+ updated to latest version of rpc program number list
@
text
@d1 1
a1 1
MD5 (nmap-2.54BETA24.tgz) = 55fbb29468cb02270b5c15785f018f13
@


1.26
log
@Update to version 2.54 Beta 22.
@
text
@d1 1
a1 1
MD5 (nmap-2.54BETA22.tgz) = 325f553a42461b78ce65fc91418fa256
@


1.25
log
@update to 2.53.
(fix commenting bug that caused major problems for some non-gcc users)
@
text
@d1 1
a1 1
MD5 (nmap-2.53.tgz) = 592ace3a758e31740d70d7ce4a2dd21c
@


1.24
log
@Update to version 2.52.
[fixes minor typos in 2.51]
@
text
@d1 1
a1 1
MD5 (nmap-2.52.tgz) = 96d355870fd417f30bf3fe76d4292615
@


1.23
log
@Update to 2.51.
2.51 fixes a target parsing bug which could in some cases cause Nmap to
crash with the error "Assertion `t->nleft > 1' failed".
@
text
@d1 1
a1 1
MD5 (nmap-2.51.tgz) = 9374b13c049c588c7067a5b49521e54d
@


1.22
log
@Update to version 2.30 beta 20.
@
text
@d1 1
a1 1
MD5 (nmap-2.30BETA20.tgz) = a697e4e5783e73fb3716d9133bb4ba58
@


1.21
log
@Update to 2.30 Beta #18.

* Fixed a very important bug that occurred when SYN scanning localhost.
* Fixed "-vv" to mean "-v -v" as it did in previous versions.
@
text
@d1 1
a1 1
MD5 (nmap-2.30BETA18.tgz) = d3b30e53ca8c474801961f98e9fdc154
@


1.20
log
@Update to version 2.3 beta 17.

* Added ACK scanning.  This scan technique is great for testing firewall
  rulesets.  It can NOT find open ports, but it can distinguish between
  filtered/unfilterd by sending an ACK packet to each port and waiting for
  a RST to come back.  Filtered ports will not send back a RST (or will
  send ICMP unreachables).  This scan type is activated with -sA .

* Documented the Window scan (-sW)

* "Protocol" field in output eliminated.  It is now printed right
   next to the number (/etc/services style).  Like "22/tcp".

* Added --resume option to continue a large network scan where you left off.
  It also allows you to start and stop for policy reasons
@
text
@d1 1
a1 1
MD5 (nmap-2.30BETA17.tgz) = c3d75335233317f51039d57705018ee9
@


1.19
log
@Update to version 2.3 Beta 14
@
text
@d1 1
a1 1
MD5 (nmap-2.3BETA14.tgz) = 6709d218c588f595574f719a394bcf02
@


1.18
log
@Upgrade to version 2.3 BETA 13.
@
text
@d1 1
a1 1
MD5 (nmap-2.3BETA13.tgz) = 15505f33d4a2d308f3c315587caadf7d
@


1.17
log
@Upgrade to version 2.3BETA12.

Submitted by:	taguchi@@tohoku.iij.ad.jp
@
text
@d1 1
a1 1
MD5 (nmap-2.3BETA12.tgz) = c64ee1566c2f244042cc4a5fcdd7d6c4
@


1.16
log
@Update to 2.3 beta #9.

This speeds up OS scans.
@
text
@d1 1
a1 1
MD5 (nmap-2.3BETA9.tgz) = 70acaa9a170efbf150f1b72e948e1807
@


1.15
log
@Update to 2.3 Beta8.

* Added "firewall mode" timing optimizations which can decrease the
  amount of time neccessary to SYN or connect scan some heavily filtered
  hosts.
* Changed "TCP Ping" to use a random ACK value rather than 0 (an IDS
  called Snort was using this to detect Nmap TCP pings).
* better FDDI support
* changes which should lead to tremendous speedups against some firewalled
  hosts.
@
text
@d1 1
a1 1
MD5 (nmap-2.3BETA8.tgz) = 3a7ee22453c9b0fc6e6cec4004965587
@


1.14
log
@Upgrade to 2.3BETA6.

*  Added sophisticated timing controls to give the user much more control
over Nmap's speed.  This allows you to make Nmap much more aggressive to
scan hosts faster, or you can make Nmap more "polite" -- slower but less
likely to wreak havoc on your Network.  You can even enforce large delays
between sending packets to sneak under IDS thresholds and prevent
detection.  See the new "Timing Options" section of the Nmap man page for
more information on using this.

*  New "Window scan" that does fun things with ACK packets.  -sW activates
this scan type.  It is mostly effective against BSD, AIX, Digital UNIX, and
various older HP/UX, SunOS, and VAX.
@
text
@d1 1
a1 1
MD5 (nmap-2.3BETA6.tgz) = 3880dd16415a143928e72002c538dfab
@


1.13
log
@Upgrade to 2.3BETA5.

This includes new RPC scanning ability & 100's of new OS fingerprints.
The machine parseable output has been cleaned up and made more regular.
@
text
@d1 1
a1 1
MD5 (nmap-2.3BETA5.tgz) = 509c640ffb9586ee61af02b607d73529
@


1.12
log
@Upgrade to nmap-2.2-BETA4.  The beta includes a very nice GUI (xnmap) that
simplifies the running of nmap for the point and shoot crowd.
@
text
@d1 1
a1 1
MD5 (nmap-2.2-BETA4.tgz) = 23c3e6c7f4969338b79c8e6fa6c2ddbd
@


1.11
log
@Upgrade to 2.12.
@
text
@d1 1
a1 1
MD5 (nmap-2.12.tgz) = 197fc5fe2888febf47efe7d823e2f678
@


1.10
log
@Upgrade to 2.11.
@
text
@d1 1
a1 1
MD5 (nmap-2.11.tgz) = cabf034d087dfaf88607191cd5ee8fda
@


1.9
log
@upgrade to 2.08
@
text
@d1 1
a1 1
MD5 (nmap-2.08.tgz) = 41cce9855810c7485d9d12be155f8321
@


1.8
log
@Update to 2.07
@
text
@d1 1
a1 1
MD5 (nmap-2.07.tgz) = 34263512d8599825db077b28609e44f6
@


1.7
log
@upgrade to 2.06
@
text
@d1 1
a1 1
MD5 (nmap-2.06.tgz) = bae2f437bbc9d024eaf1e0c371ed0a34
@


1.6
log
@upgrade to 2.05
@
text
@d1 1
a1 1
MD5 (nmap-2.05.tgz) = 0a62ac9533276d6c0204fd7a843822e2
@


1.5
log
@upgrade to 2.03
@
text
@d1 1
a1 1
MD5 (nmap-2.03.tgz) = e08470905d9be127eb911210c0fe79a7
@


1.4
log
@upgrade to 2.02
@
text
@d1 1
a1 1
MD5 (nmap-2.02.tgz) = 9e0d43a015b13a529dc3050d4732ac76
@


1.3
log
@upgrade to 2.01
[many new OS fingerprints included :-) ]
@
text
@d1 1
a1 1
MD5 (nmap-2.01.tgz) = 3b5fb733b03f615e73329f803f5ffe96
@


1.2
log
@Upgrade to 2.00.
@
text
@d1 1
a1 1
MD5 (nmap-2.00.tgz) = 063f1b0d901e0787416c92d67b1cd283
@


1.1
log
@Initial revision
@
text
@d1 1
a1 1
MD5 (nmap-1.51.tar.gz) = 1a5e2d4fbc455120a581c1bd68dbd9d7
@


1.1.1.1
log
@nmap is a utility for port scanning large networks
Sometimes you need speed, other times you may need stealth. In some cases,
bypassing firewalls may be required. Not to mention the fact that you may
want to scan different protocols (UDP, TCP, ICMP, etc.).
You just can't do all this with one scanning mode.  Thus nmap
incorporats virtually every scanning technique known of.

See the nmap homepage at http://www.insecure.org/nmap/index.html
@
text
@@
