Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Nmap
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==History== Nmap was first published in September 1997, as an article in [[Phrack Magazine]] with source-code included.<ref name="phrack51">{{cite magazine |url=http://phrack.org/issues/51/11.html#article |magazine=[[Phrack Magazine]]|title=The Art of Port Scanning |volume=7 |issue=51 |date=1997-09-01 |access-date=2018-10-29}}</ref> With help and contributions of the computer security community, development continued. Enhancements included operating system fingerprinting, service fingerprinting,<ref name="vscan" /> code rewrites ([[C (programming language)|C]] to [[C++]]), additional scan types, protocol support (e.g. [[IPv6]], [[SCTP]]<ref>{{cite web |url=https://www.roe.ch/Nmap_SCTP |title=SCTP Support for Nmap |website=Roe.ch |date=2011-05-10 |access-date=2018-10-29}}</ref>) and new programs that complement Nmap's core features. Major releases include:<ref name="changelog" /> {| class="wikitable" |- ! Date !! Version !! Significance |- | style="text-align:right;white-space:nowrap;" | {{Start date and age|1998|12|12}} || Nmap 2.00 || Nmap 2.00 is released, including Operating System fingerprinting<ref name="book-history">{{cite web |url=https://nmap.org/book/history-future.html#history |title=The History and Future of Nmap |publisher=Nmap.org |access-date=2018-10-29}}</ref> |- | style="text-align:right;white-space:nowrap;" | {{Start date and age|1999|04|11}} || NmapFE || A [[GTK+]] front end, is bundled with Nmap<ref name="book-history" /> |- | style="text-align:right;white-space:nowrap;" | {{Start date and age|2000|12|07}} || || Windows port<ref name="changelog">{{cite web |url=https://nmap.org/changelog.html |title=Nmap Changelog |publisher=Nmap.org |access-date=2018-10-29}}</ref> |- | style="text-align:right;white-space:nowrap;" | {{Start date and age|2002|08|28}} || || Rewrite from C to C++<ref name="changelog" /> |- | style="text-align:right;white-space:nowrap;" | {{Start date and age|2003|09|16}} || || The first public release to include service version detection<ref name="changelog" /> |- | style="text-align:right;white-space:nowrap;" | {{Start date and age|2004|08|31}} || Nmap 3.70 ||Core scan engine rewritten for version 3.70. New engine is called ''ultra_scan''<ref>{{cite web |url=https://seclists.org/nmap-announce/2004/10 |title=Nmap 3.70 Released—Core Scan Engine Rewrite! |publisher=Seclists.org |date=2004-08-31 |access-date=2018-10-29}}</ref> |- | style="text-align:center;" | Summer 2005 || || Nmap selected for participation in [[Google Summer of Code]].<ref>{{cite web |url=https://seclists.org/nmap-announce/2005/7 |title=Google sponsors Nmap summer student developers |publisher=Seclists.org |date=2005-06-02 |access-date=2018-10-29}}</ref> Added features included Zenmap, Nmap Scripting Engine (NSE), [[Ncat]], and 2nd-generation OS detection. |- | style="text-align:right;white-space:nowrap;" | {{Start date and age|2007|12|13}} || Nmap 4.50 || Nmap 4.50, the 10th Anniversary Edition, was released. Included Zenmap, 2nd-generation OS detection, and the Nmap Scripting Engine<ref>{{cite web |url=https://insecure.org/stf/Nmap-4.50-Release.html |title=Nmap 4.50 Press Release |publisher=Insecure.org |date=2007-12-13 |access-date=2018-10-29}}</ref> |- | style="text-align:right;white-space:nowrap;" | {{Start date and age|2009|03|30}} || style="white-space:nowrap;" | Nmap 4.85BETA5 ||Emergency release of Nmap 4.85BETA5, leveraging NSE to detect [[Conficker]] infections<ref>{{cite web |url=https://seclists.org/nmap-dev/2009/q1/870 |title=Nmap 4.85BETA5: Now with Conficker detection! |publisher=Seclists.org |date=2009-03-30 |access-date=2018-10-29}}</ref> |- | style="text-align:right;white-space:nowrap;" | {{Start date and age|2009|07|16}} || Nmap 5.00 || Included [[netcat]]-replacement Ncat and Ndiff scan comparison tool<ref>{{cite web |url=https://nmap.org/5/ |title=Nmap 5.00 Released |publisher=Nmap.org |date=2009-07-16 |access-date=2018-10-29}}</ref> |- | style="text-align:right;white-space:nowrap;" | {{Start date and age|2011|01|28}} || Nmap 5.50 || Included Nping packet generation response analysis and response time measurement, including TCP, UDP and ICMP probe modes.<ref>{{Cite web|url=https://github.com/nmap/nmap|title=nmap/nping/docs/nping.1 at master · nmap/nmap|website=GitHub}}</ref><ref>{{cite web |url=https://seclists.org/nmap-announce/2011/0 |title=Nmap 5.50: Now with Gopher protocol support! |publisher=Seclists.org |date=2011-01-28 |access-date=2018-10-29}}</ref> |- | style="text-align:right;white-space:nowrap;" | {{Start date and age|2012|05|21}} || Nmap 6.00 || Released with full IPv6 support.{{Citation needed|date=January 2014}} |- | style="text-align:right;white-space:nowrap;" | {{Start date and age|2015|11|09}} || Nmap 7.00 <ref>{{cite web |url=https://nmap.org/7/ |title=Nmap 7 Released |publisher=Nmap.org |date=2015-11-19 |access-date=2018-10-29}}</ref> || |- | style="text-align:right;white-space:nowrap;" | {{Start date and age|2016|12|20}} || Nmap 7.40 || |- | style="text-align:right;white-space:nowrap;" | {{Start date and age|2018|03|20}} || Nmap 7.70 <ref>{{cite web |url=https://nmap.org/changelog.html#7.70 |title=Nmap 7.70 |publisher=Nmap.org |date=2018-03-20 |access-date=2018-10-29}}</ref> || |- | style="text-align:right;white-space:nowrap;" | {{Start date and age|2019|08|10}} || Nmap 7.80 <ref>{{cite web |url=https://nmap.org/changelog.html#7.80 |title=Nmap 7.80 |publisher=Nmap.org |date=2019-08-10 |access-date=2019-08-10}}</ref> || |- | style="text-align:right;white-space:nowrap;" | {{Start date and age|2020|10|03}} || Nmap 7.90 <ref>{{cite web |url=https://nmap.org/changelog.html#7.90 |title=Nmap 7.90 |publisher=Nmap.org |date=2019-10-03 |access-date=2020-10-03}}</ref> || The new fingerprints allow better operating system and service/version detection. 3 new NSE scripts, new protocol library and payloads for host discovery, port scanning and version detection. Npcap 1.0.0, the first fully stable version of the Windows raw packet capturing/sending driver. |}
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)