nmap is a network analysis and exploration tool that looks for open communications ports on a TCP/IP stack. What makes it different from most other systems is the ability to do so stealthy and very precise. Since the days of the original phrack article and the 1.49 release, it developed to a complete system identification tool. It is capable of identifying most operating systems based on handling of unlikely packet flag combinations. This version adds direct (non-portmapper) RPC scanning to the already impressive list of features. This feature allows to gain quite useful information on rpc-services even when the target has firewalled the rpc-portmapper-port.
Author: Fyodor <fyodor [at] dhp [dot] com>
Maintainer: The T2 Project <t2 [at] t2-project [dot] org>
Build time (on reference hardware): 8430% (relative to binutils)2
Installed size (on reference hardware): 1.83 MB, 30 files
Dependencies (build time detected): bash binutils bzip2 ccache coreutils diffutils findutils gawk gcc glib12 glibc grep gtk+12 libpcap linux-header make mktemp net-tools openssl pcre sed sysfiles tar util-linux xorg
Installed files (on reference hardware): n.a.
1) This page was automatically generated from the T2 package source. Corrections, such as dead links, URL changes or typos need to be performed directly on that source.
2) Compatible with Linux From Scratch's "Standard Build Unit" (SBU).