nmap is a network analysis and exploration tool that looks for open communications ports on a TCP/IP stack. What makes it different from most other systems is the ability to do so stealthy and very precise. Since the days of the original phrack article and the 1.49 release, it developed to a complete system identification tool. It is capable of identifying most operating systems based on handling of unlikely packet flag combinations. This version adds direct (non-portmapper) RPC scanning to the already impressive list of features. This feature allows to gain quite useful information on rpc-services even when the target has firewalled the rpc-portmapper-port.
Author: Fyodor <fyodor [at] dhp [dot] com>
Maintainer: The T2 Project <t2 [at] t2-project [dot] org>
Build time (on reference hardware): 45% (relative to binutils)2
Installed size (on reference hardware): 2.31 MB, 22 files
Dependencies (build time detected): 00-dirtree atk bash binutils bzip2 cairo coreutils diffutils expat findutils fontconfig freetype gawk gcc glib glibc glitz grep gtk+ inputproto kbproto libice libpcap libpng libsm libx11 libxau libxcursor libxdmcp libxext libxfixes libxi libxinerama libxrandr libxrender linux-header make mktemp net-tools openssl pango pcre pkgconfig renderproto sed sysfiles tar util-linux xproto
Installed files (on reference hardware): n.a.
1) This page was automatically generated from the T2 package source. Corrections, such as dead links, URL changes or typos need to be performed directly on that source.
2) Compatible with Linux From Scratch's "Standard Build Unit" (SBU).