nmap is a network analysis and exploration tool that looks for open communications ports on a TCP/IP stack. What makes it different from most other systems is the ability to do so stealthy and very precise. Since the days of the original phrack article and the 1.49 release, it developed to a complete system identification tool. It is capable of identifying most operating systems based on handling of unlikely packet flag combinations. This version adds direct (non-portmapper) RPC scanning to the already impressive list of features. This feature allows to gain quite useful information on rpc-services even when the target has firewalled the rpc-portmapper-port.
Author: Fyodor <fyodor [at] dhp [dot] com>
Maintainer: The T2 Project <t2 [at] t2-project [dot] org>
Remark: Does not allow parallel builds.
Build time (on reference hardware): 35% (relative to binutils)2
Installed size (on reference hardware): 11.49 MB, 465 files
Dependencies (build time detected): 00-dirtree bash binutils bzip2 coreutils diffutils findutils gawk gcc glibc grep libcdio libpcap linux-header lua make man mktemp net-tools openssl pcre python rpm sed shadow sysfiles tar
Installed files (on reference hardware): n.a.
1) This page was automatically generated from the T2 package source. Corrections, such as dead links, URL changes or typos need to be performed directly on that source.
2) Compatible with Linux From Scratch's "Standard Build Unit" (SBU).