OK
https://insecure.org/
Iceland
Country
Network
December 04, 2024, 07:56 AM UTC
Date & Time
Websites
Websites
Runtime: 2.6s
On December 04, 2024, 07:56 AM UTC, https://insecure.org/ was accessible when tested on AS51896 in Iceland.

Failures

HTTP Experiment
null
DNS Experiment
null
Control
null

DNS Queries

Resolver:
45.134.88.121
Query:
IN A insecure.org
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
A
50.116.1.184
Query:
IN AAAA insecure.org
Engine:
system
Name
Class
TTL
Type
DATA
@
IN
AAAA
2600:3c01:e000:3e6::6d4e:7061

TCP Connections

Connection to 50.116.1.184:443 succeeded.
Connection to 2600:3c01:e000:3e6::6d4e:7061:443 succeeded.

HTTP Requests

URL
GET https://insecure.org/
Response Headers
Accept-Ranges:
bytes
Content-Type:
text/html; charset=UTF-8
Date:
Wed, 04 Dec 2024 07:56:51 GMT
Server:
Apache/2.4.6 (CentOS)
Response Body
<!DOCTYPE html>
<HTML>
<HEAD>
<TITLE>Insecure.Org - Nmap Free Security Scanner, Tools & Hacking resources</TITLE>
<META name="description" content="Network Security Tools/Software (Free Download) including Nmap Open Source Network Security Scanner; Redhat Linux,Microsoft Windows,FreeBSD,UNIX Hacking.">
<META name="keywords" content="Nmap Security Scanner,Free Download,Software,Linux,Microsoft Windows,Unix,Tool,Open Source,FreeBSD,Network Tools,Network Security,Hacking,Redhat">

<script type="application/ld+json">{
 "@context": "https://schema.org",
  "@type": "WebSite",
  "url": "https://insecure.org/",
  "image": "https://insecure.org/images/sitelogo.png",
  "potentialAction": {
   "@type": "SearchAction",
   "target": {
    "@type": "EntryPoint",
    "urlTemplate": "https://insecure.org/search.html?q={term}"
   },
   "query-input": "required name=term"
  }
}
</script>
<meta name="viewport" content="width=device-width,initial-scale=1">
<meta name="theme-color" content="#2A0D45">
<link rel="preload" as="image" href="/images/sitelogo.png" imagesizes="168px" imagesrcset="/images/sitelogo.png, /images/sitelogo-2x.png 2x">
<link rel="preload" as="image" href="/shared/images/nst-icons.svg">
<link rel="stylesheet" href="/shared/css/nst.css?v=2">
<script async src="/shared/js/nst.js?v=2"></script>
<link rel="stylesheet" href="/shared/css/nst-foot.css?v=2" media="print" onload="this.media='all'">
<link rel="stylesheet" href="/site.css">
<!--Google Analytics Code-->
<link rel="preload" href="https://www.google-analytics.com/analytics.js" as="script">
<script>
(function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){
(i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o),
m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m)
})(window,document,'script','//www.google-analytics.com/analytics.js','ga');
ga('create', 'UA-11009417-1', 'auto');
ga('send', 'pageview');
</script>
<!--END Google Analytics Code-->
<META NAME="ROBOTS" CONTENT="NOARCHIVE">
<link rel="shortcut icon" href="/shared/images/tiny-eyeicon.png" type="image/png">
</head>
<body><div id="nst-wrapper">

<div id="menu">
 <div class="blur">
  <header id="nst-head">

    <a id="menu-open" href="#menu" aria-label="Open menu">
     <img width="44" height="44" alt="" aria-hidden="true"
      src="/shared/images/nst-icons.svg#menu">
    </a>
    <a id="menu-close" href="#" aria-label="Close menu">
     <img width="44" height="44" alt="" aria-hidden="true"
      src="/shared/images/nst-icons.svg#close">
    </a>

   <a id="nst-logo" href="/" aria-label="Home page">
    <img alt="Home page logo" srcset="/images/sitelogo.png, /images/sitelogo-2x.png 2x" src="/images/sitelogo.png" onerror="this.onerror=null;this.srcset=this.src" height=90 width=168></a>

   <nav id="nst-gnav">
    <a class="nlink" href="https://nmap.org/">Nmap.org</a>
    <a class="nlink" href="https://npcap.com/">Npcap.com</a>
    <a class="nlink" href="https://seclists.org/">Seclists.org</a>
    <a class="nlink" href="https://sectools.org">Sectools.org</a>
    <a class="nlink" href="https://insecure.org/">Insecure.org</a>
   </nav>

   <form class="nst-search" id="nst-head-search" action="/search/">
    <input class="nst-search-q" name="q" type="search" placeholder="Site Search">
    <button class="nst-search-button" title="Search">
     <img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true"
      src="/shared/images/nst-icons.svg#search">
     </button>
   </form>

  </header>
 </div>
</div>

<main id="nst-content">


<h1 class="title">Featured News</h1>

<h2 class="purpleheader">Nmap 7.00 Released</h2>

<P>The Nmap Project is pleased to announce the
immediate, free availability of the Nmap Security Scanner version 7.00 from
<a href="https://nmap.org/">https://nmap.org/</a>. It is the product of three
and a half years of work, nearly 3200 code commits, and more than a dozen point
releases since the big <a href="https://nmap.org/6/">Nmap 6 release</a> in May
2012. Nmap turned 18 years old in September this year and celebrates its
birthday with 167 new NSE scripts, expanded IPv6 support, world-class SSL/TLS
analysis, and more user-requested features than ever.
We recommend that all current users <a href="https://nmap.org/download.html">upgrade</a>.
 The top 6 improvements in Nmap 6 are:
<UL>
<LI><a href="https://nmap.org/7/#changes-nse">Major Nmap Scripting Engine expansion, including 167 new NSE scripts</a>
<LI><a href="https://nmap.org/7/#changes-ipv6">Mature IPv6 support</a>
<LI><a href="https://nmap.org/7/#changes-infrastructure">Infrastructure upgrades, including a bug tracker</a>
<LI><a href="https://nmap.org/7/#changes-performance">Faster scans</a>
<LI><a href="https://nmap.org/7/#changes-ssl">Enhancements to SSL/TLS scanning</a>
<LI><a href="https://nmap.org/7/#7changes">Extreme portability</a>
</UL>

<P>For full details, see the <a href="https://nmap.org/7/">release notes</a> or skip straight to the <a href="https://nmap.org/download.html">download page</a>.

<h2 class="purpleheader">Rebooting the Full Disclosure Mailing List</h2>

<p>Much of the security community has missed the Full Disclosure Mailing List since it <a href="https://seclists.org/fulldisclosure/2014/Mar/332">abruptly shut down on March 19</a>, so we've decided to <a href="https://insecure.org/news/fulldisclosure/">reboot it for a fresh start</a>!  You can <a href="https://nmap.org/mailman/listinfo/fulldisclosure">subscribe to the new list here</a>. 

<h2 class="purpleheader">Icons of the Web</h2>

<p>
<A HREF="https://nmap.org/favicon/"><IMG WIDTH=150 HEIGHT=150 align=right SRC="https://nmap.org/favicon/images/favicon-thumb-150x150.png" ALT="Favicon Project"></a>
The <a href="https://nmap.org">Nmap Project</a> is pleased to release our new and improved <a href="https://nmap.org/favicon/">Icons of the Web</a> project!  We scanned the Internet's top million web sites and created an interactive 5-gigapixel collage of the results.  You can explore it with our <a href="https://nmap.org/favicon/">online viewer</a> including pan/zoom and search capabilities to find your favorite sites.

<h2 class="purpleheader">Nmap 6.40 Released</h2>

Nmap 6.40 is now available with with 14 new <a href="https://nmap.org/book/nse.html">NSE scripts</a> and hundreds of new <a href="https://nmap.org/book/osdetect.html">OS</a> and <a href="https://nmap.org/book/vscan.html">version detection</a> signatures.  It also includes great new features such as Lua integration for scripting <a href="https://nmap.org/ncat/">Ncat</a>, and initial support for NSE and version scanning through a chain of
proxies, improved target specification.  Of course there are many performance enhancements and bug fixes too!

<P>You can <a href="https://seclists.org/nmap-announce/2013/1">read the full details</a> or <a href="https://nmap.org/download.html">download it free here</a>.

<h2 class="purpleheader">Nmap 6.25 Released</h2>

We're proud to <a href="https://seclists.org/nmap-hackers/2012/4">release Nmap 6.25</a> with hundreds of improvements, including 85 new <a href="https://nmap.org/nsedoc/">Nmap Scripting Engine</a> scripts,
Nearly 1,000 new fingerprints for <a href="https://nmap.org/book/osdetect.html">OS detection</a> and <a href="https://nmap.org/book/vscan.html">service/application version detection</a>,
and Performance enhancements such as the new kqueue and poll I/O engines.

<P>You can <a href="https://seclists.org/nmap-hackers/2012/4">read the full details</a> or <a href="https://nmap.org/download.html">download it free here</a>.

<h2 class="purpleheader">Nmap 6.00 Released</h2>

<P>The Nmap Project is pleased to announce
the immediate, free availability of the Nmap Security Scanner version
6.00 from <A HREF="https://nmap.org/">https://nmap.org/</A>.  It is the
product of almost three years of work, 3,924 code commits, and more
than a dozen point releases since the
big <a href="https://nmap.org/5/">Nmap 5 release</a> in July 2009.  We
recommend that all current users <a href="https://nmap.org/6#download">upgrade</a>.  The top 6 improvements in Nmap 6 are:
<UL>
<LI><a href="https://nmap.org/6/#changes-nse">Major Nmap Scripting Engine enhancements, including 289 new NSE scripts</a>
<LI><a href="https://nmap.org/6/#changes-web">New web scanning capabilities</a>
<LI><a href="https://nmap.org/6/#changes-ipv6">Full IPv6 support</a>,
<LI><a href="https://nmap.org/6/#changes-nping">A new tool named Nping for packet generation and response analysis</a>
<LI><a href="https://nmap.org/6/#changes-zenmap">More capable Zenmap GUI and results viewer</a>
<LI><a href="https://nmap.org/6/#changes-performance">Faster scans</a>
</UL>

<P>For full details, see the <a href="https://nmap.org/6/">release notes</a> or skip straight to the <a href="https://nmap.org/download.html">download page</a>.

<h2 class="purpleheader">SecTools.Org Relaunched</h2>

<P>3,000 people participated in the latest top security tools survey and we have relaunched <a href="https://sectools.org">SecTools.Org</a> with the new data!  We have also dramatically improved the site&mdash;it now allows user ratings and reviews, tracks release dates, offers searching and sorting, and allows you to <a href="https://sectools.org/contrib/">suggest your own favorite tools</a>.  Are you familiar with all of the <a href="https://sectools.org/tag/new/">49 new tools</a> in this edition?


<h2 class="purpleheader">Nmap 5.30BETA1 Released With 37 New Scripts, Nping, and New Apple Vulnerability</h2>

<P>We're proud to <a href="https://seclists.org/nmap-hackers/2010/3">release Nmap 5.30BETA1</a> with about 100 significant improvements, including:
<UL>
<LI>37 new <a href="https://nmap.org/book/nse.html">NSE Scripts</a>, covering SNMP, SSL, Postgress, MySQL, HTTP, LDAP, NFS, DB2, AFS, and much more.
<LI>Nmap developer Patrik Karlsson found a <a href="http://www.cqure.net/wp/2010/03/detecting-apple-mac-os-x-afp-vulnerability-cve-2010-0533-with-nmap/">major remote vulnerability in Mac OS X</a>, which allows access to files in the parent directory of an AFS share. He wrote a <a href="https://nmap.org/nsedoc/scripts/afp-path-vuln.html">detection/exploitation NSE script</a>, which you'll find in this release.
<LI>An alpha test version of our <a href="https://nmap.org/nping/">Nping packet generation utility.</a>
</UL>

<P>News reports: 
<a href="http://www.itwire.com/business-it-news/security/37997-nmap-developer-announces-mac-os-x-vulnerability?start=1">ITWire</a>,
<a href="http://isc.sans.org/diary.html?storyid=8530">SANS Diary (brief)</a>,
<a href="http://pentestit.com/2010/03/30/update-nmap-530beta1/">PenTestIT (brief)</a>


<h2 class="purpleheader">Nmap 5.20 Released</h2>

<P>
<A HREF="https://nmap.org/5/screenshots/zenmap-5-topology-885x793.png"><IMG WIDTH=240 HEIGHT=193 align=right SRC="https://nmap.org/5/screenshots/zenmap-5-topology-thumbnail-240x193.png" ALT="Zenmap topology thumbnail"></a>
We're happy to <a href="https://seclists.org/nmap-hackers/2010/0">release Nmap 5.20</a>, offering 150+ significant improvements over 5.00, including:
<UL>
<LI>31 new <a href="https://nmap.org/book/nse.html">NSE Scripts</a>
<LI>enhanced performance and reduced memory consumption
<LI>protocol-specific <a href="https://seclists.org/nmap-dev/2009/q3/651">payloads</a> for more effective UDP scanning
<LI>a completely rewritten traceroute engine
<LI>massive <a href="https://seclists.org/nmap-dev/2009/q4/416">OS</a> and <a href="https://seclists.org/nmap-dev/2009/q4/726">version detection</a> DB updates (10,000+ signatures)
<LI>Zenmap <a href="https://nmap.org/book/zenmap-filter.html">host filter mode</a> shows just the hosts you're interested in.
</UL>

<P>For a more detailed list of changes, see the <a href="https://seclists.org/nmap-hackers/2010/0">release notes</a>. Source packages as well as binary installers for Linux, Windows, and Mac OS X are all available from the <a href="https://nmap.org/download.html">Nmap download page</a>.

<h2 class="purpleheader">Nmap 5.00 Released!</h2>

<P>
<A HREF="https://nmap.org/5/screenshots/nmap5-samplescan-706x964.png"><IMG WIDTH=240 HEIGHT=245 align=right SRC="https://nmap.org/5/screenshots/nmap5-samplescan-thumbnail-240x245.png" ALT="Scan output thumbnail"></A>


After more than 18 months of work since the <a href="https://insecure.org/stf/Nmap-4.50-Release.html">4.50 release</a>, Insecure.Org is <a
href="https://nmap.org/5/">pleased to announce</A> the immediate, free
availability of the Nmap Security Scanner version 5.00 from <a
href="https://nmap.org">https://nmap.org</a>.  With nearly 600 significant changes, we consider this the most important Nmap release since 1997 and we recommend that all current users upgrade!

<P>
The <a href="https://nmap.org/5/">release notes</a> provide
the <a href="https://nmap.org/5/#5changes">top 5 improvements in Nmap
5</a> as well as <a href="https://nmap.org/5/#screenshots">example runs
and screen shots</a>.  The <a href="https://nmap.org/5/#changes">change
details</a> section includes improvements to
the <a href="https://nmap.org/5/#changes-nse">Nmap Scripting
Engine</a>, <a href="https://nmap.org/5/#changes-zenmap">Zenmap GUI and
Results Viewer</a>, the <a href="https://nmap.org/5/#changes-ncat">new
Ncat tool</a>, the <a href="https://nmap.org/5/#changes-ndiff">new
Ndiff scan comparison
tool</a>, <a href="https://nmap.org/5/#changes-performance">performance
improvements</a>, the <a href="https://nmap.org/5/#changes-book">new
Nmap book</a>, and much more!

<P>Source packages as well as binary installers for Linux, Windows, and Mac OS X are all available from the <a href="https://nmap.org/download.html">Nmap download page</a>.

<P><b>Update</b>: We've gotten some great press from
<a href="http://www.itwire.com/content/view/26343/53/">ITWire</a>,
<a href="http://tech.slashdot.org/story/09/07/16/1924232">Slashdot</a>,
<a href="http://www.securityfocus.com/brief/988">SecurityFocus</a>,
<a href="http://www.lovemytool.com/blog/2009/07/nmap_5.html">LoveMyTool</a>,
<a href="http://www.reddit.com/r/programming/comments/91uzu/nmap_500_released_considered_by_maintainers_as/">Reddit</a>,
<a href="http://news.ycombinator.com/item?id=708318">Linux Weekly News</a>,
<a href="http://blog.internetnews.com/skerner/2009/07/nmap-5-improves-open-source-ne.html">InternetNews.Com</a>,
<a href="http://search.twitter.com/search?q=nmap">Twitter</a>, and <a href="https://nmap.org/5/#articles">dozens more</a>.

<h2 class="purpleheader">Nmap Network Scanning</h2>

<P><a href="https://nmap.org/book/"><img width=326 height=200 src="https://nmap.org/book/cover/nns-whole-cover-326x200.jpg" align=right alt="Nmap Network Scanning cover"></a>

<P>After years of effort, we are delighted to
release <a href="https://nmap.org/book/">Nmap Network Scanning: The
Official Nmap Project Guide to Network Discovery and Security
Scanning</a>!

<p>From explaining port scanning basics for novices to
detailing low-level packet crafting methods used by advanced hackers,
this book by Nmap's original author suits all levels of security and
networking professionals. The reference guide documents every Nmap
feature and option, while the remainder demonstrates how to apply them
to quickly solve real-world tasks. Examples and diagrams show actual
communication on the wire. Topics include subverting firewalls and
intrusion detection systems, optimizing Nmap performance, and
automating common networking tasks with the Nmap Scripting Engine.

<p>Visit <a href="https://nmap.org/book/">the NNS web site</a> for a <a href="https://nmap.org/book/#intro">detailed summary</a>, <a href="https://nmap.org/book/#reviews">reviews</a>, and <a href="https://nmap.org/book/toc.html">sample chapters</a>, or <a href="http://www.amazon.com/dp/0979958717?tag=secbks-20">buy it now from Amazon</a>.

<a name="conficker"></a>
<h2 class="purpleheader">Nmap 4.85BETA7 Released to Scan for Conficker Worm</h2>

<P>The Conficker worm is receiving a lot of attention because of its
vast scale (millions of machines infected) and advanced update
mechanisms.  Conficker isn't the end of the Internet (despite some of
that hype), but it <b>is</b> a huge nuisance we can all help to clean
up.

<P>Thanks to excellent <a href="http://www.honeynet.org/papers/conficker/">research</a> by Tillmann Werner and Felix Leder
of <a href="http://www.honeynet.org/">The Honeynet Project</a> and
implementation work by Ron Bowes, David Fifield, Brandon Enright, and
Fyodor, we've rolled out a new Nmap release which can remotely scan
for and detect infected machines.  Nmap 4.85BETA7 is now available
from the <a href="https://nmap.org/download.html">download page</a>,
including official binaries for Windows and Mac OS X.  To scan for
Conficker, use a command such as:
<br><b>nmap -PN -T4 -p139,445 -n -v --script smb-check-vulns,smb-os-discovery --script-args safe=1 [targetnetworks]</b><br>

<P>You will only see Conficker-related output if either port 139 or 445 are open on a host.  A clean machine reports at the bottom: &ldquo;<b>Conficker: Likely CLEAN</b>&rdquo;, while likely infected machines say: &ldquo;<b>Conficker: Likely INFECTED</b>&rdquo;.  For more advice, see <a href="https://seclists.org/nmap-dev/2009/q1/0869.html">this nmap-dev post by Brandon Enright</a>.

<P>While Conficker gets all the attention, 4.85BETA7 also has <a href="https://nmap.org/changelog.html">many other great improvements</a>.

<P><b>Update:</b> Changed version from 4.85BETA5 (first to detect Conficker) to 4.85BETA7, which includes <a href="https://nmap.org/changelog.html">further Conficker detection improvements, among other changes</a>.

<P>More information is available from:
<a href="http://www.channelregister.co.uk/2009/03/30/conficker_signature_discovery/">The Register</a>,
<a href="http://it.slashdot.org/article.pl?sid=09/03/30/090224">Slashdot</a>,
<a href="http://voices.washingtonpost.com/securityfix/2009/03/flaw_in_conficker_worm_may_aid.html?wprss=securityfix">Washington Post</a>,
<a href="http://www.securityfocus.com/brief/936">SecurityFocus</a>,
<a href="http://news.cnet.com/8301-1009_3-10207375-83.html">CNet</a>,
<a href="http://www.scmagazineus.com/Conficker-detection-tool-released-as-D-Day-nears/article/129679/">SC Magazine</a>,
<a href="http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;articleId=9130733&amp;intsrc=news_ts_head">ComputerWorld</a>,
<a href="http://www.skullsecurity.org/blog/?p=209">SkullSecurity (Ron Bowes)</a>,
<a href="http://www.betanews.com/article/Found-An-Achilles-heel-for-Conficker/1238445103">Beta News</a>,
<a href="http://www.pcmag.com/article2/0,2817,2344060,00.asp">PC World</a>,
<a href="http://www.eweek.com/c/a/Security/Security-Researchers-Score-Win-Against-Conficker-Worm/">eWeek</a>,
<a href="http://www.crn.com/security/216401818">CRN.com</a>,
<a href="http://www.technewsworld.com/story/66666.html">TechNewsWorld</a>,
<a href="http://www.darkreading.com/blog/archives/2009/03/conficker_detec.html">DarkReading</a>,
<a href="http://www.computerweekly.com/Articles/2009/03/31/235462/conficker-can-no-longer-hide-in-the-network.htm">ComputerWeekly</a>,
<a href="http://www.pcmag.com/article2/0,2817,2344074,00.asp">PC Magazine</a>,
<a href="http://www.threatpost.com/blogs/honeynet-project-finds-way-fingerprint-conficker-infections">Threat Post</a>,
<a href="http://blogs.zdnet.com/security/?p=3043">ZDNet</a>.

<h2 class="purpleheader">Nmap 4.75 Released</h2>

<P>We are pleased to <a href="https://seclists.org/nmap-hackers/2008/0004.html">release</a> Nmap 4.75, with <a href="https://nmap.org/changelog.html">almost 100 significant improvements</a> since version 4.68. Key Nmap 4.75 changes include:
<UL>

<LI>Fyodor spent much of this summer scanning tens of millions of IPs
  on the Internet (plus collecting data contributed by some
  enterprises) to determine the most commonly open ports. Nmap now
  uses that empirical data to scan more effectively.

<LI>Zenmap Topology and Aggregation features were added, as discussed in the next news item.

<LI>Hundreds of OS detection signatures were added, bringing the total to 1,503.

<LI>Seven new Nmap Scripting Engine (NSE) scripts were added.  These
automate routing AS number lookups, &ldquo;Kaminsky&rdquo; DNS bug
vulnerability checking, brute force POP3 authentication cracking, SNMP
querying and brute forcing, and whois lookups against target IP space.
Many valuable libraries were added as well.

<LI>Many performance improvements and bug fixes were implemented.  In
particular, Nmap now works again on Windows 2000.

</UL>

<P>Many of these changes were discussed in Fyodor's Black Hat and Defcon presentations.  The audio and video has now been <a href="/presentations/">posted on the presentations page</a>.

<P>Download the source tarball or binaries for Linux, Windows, or Mac OS X from the <a href="https://nmap.org/download.html">Nmap download page</a>.  If you find any bugs, please <a href="https://nmap.org/book/man-bugs.html">report them</a>.

<h2 class="purpleheader">Zenmap Gains Topology Maps and Aggregation Features</h2>

<P><a href="https://nmap.org/book/zenmap-topology.html"><img src="https://nmap.org/book/images/zenmap-fig-topology-fill-255x143.png" align=right width=255 height=143></a>

<P>While Nmap stands for &ldquo;Network Mapper&rdquo;, it hasn't been
able to actually draw you a map of the network&mdash;until now!  The
new <a href="https://nmap.org/book/zenmap-topology.html">Zenmap Network
Topology feature</a> provides an interactive, animated visualization
of the hosts on a network and connections between them.  The scan
source is (initially) in the center, with other hosts on a series of
concentric circles which represent the number of hops away they are
from the souce.  Nodes are connected by lines representing discovered paths between them.  Read the full details (and oogle the pretty pictures)
in our article
on <a href="https://nmap.org/book/zenmap-topology.html">Surfing the
Network Topology</a>.  Special thanks go to Jo&atilde;o Medeiros,
David Fifield, and Vladimir Mitrovic for their tireless work in
developing and integrating this new feature.

<P>Another exciting new Zenmap feature
is <a href="https://nmap.org/book/zenmap-scanning.html#aggregation">scan
aggregation</a>, which allows you to combine the results of many Nmap
scans into one view. When one scan is finished, you may start another
in the same window.  Results of the new scan are seamlessly merged
into one view.

<P>You can try these and many other great features with the latest version of <a href="https://nmap.org/zenmap">Zenmap</a>, available from the <a href="https://nmap.org/download.html">Nmap download page</a>.

<h2 class="purpleheader">Nmap Summer News Roundup</h2>

<UL>
<LI>Fyodor spoke in Las Vegas at the Black Hat Briefings and Defcon to discuss the results of large-scale Internet
scans he has been conducting, and demonstrate how you can use the
empirical data to make your scans (over the Internet or even internal)
more efficient. He also showed off some new
Nmap features which can help you bypass firewall restrictions, reduce
scan times, and gather more information about remote hosts.  The presentation video is now <a href="https://nmap.org/presentations/">available on the presentations page</a>.

<LI>RSS feeds for mailing lists archived by <a href="https://seclists.org">SecLists.Org</a> now sport message excerpts to make it easier to identify interesting messages.

<LI>We now have a working search engine which covers all of our sites
(<a href="https://insecure.org">Insecure.Org</a>, <a href="https://nmap.org">Nmap.Org</a>, <a href="https://seclists.org">SecLists.Org</a>,
and <a href="https://sectools.org">SecTools.Org</a>.  You can find the
search bar on the left sidebar or bottom of our normal pages,
or <a href="https://insecure.org/search.html">visit our search page</a>
directly.

<LI>And for a bit of fun news, Nmap's movie stardom has grown with an appearance in its <a href="https://nmap.org/movies.html#13game">seventh movie</a>!
</UL>

<h2 class="purpleheader">Nmap Celebrates 10th Anniversary With Major Version 4.50 Release</h2>

<P>After nearly two years of work since the <a href="https://insecure.org/stf/Nmap-4.00-Release.html">4.00 release</a>, Insecure.Org is pleased to <a
href="stf/Nmap-4.50-Release.html">announce</A> the immediate, free
availability of the Nmap Security Scanner version 4.50 from <a
href="https://nmap.org">https://nmap.org</a> .  Nmap was first released in 1997, so this release celebrates our 10th anniversary!

<P>Major new features since 4.00 include
the <a href="https://nmap.org/zenmap/">Zenmap cross-platform
GUI</a>, <a href="https://nmap.org/book/osdetect.html">2nd Generation
OS Detection</a>, the <a href="https://nmap.org/book/nse.html">Nmap Scripting Engine</a>, a rewritten host discovery system, performance
optimization, advanced traceroute functionality,  TCP and IP options support, and nearly 1,500 new <a href="https://nmap.org/book/vscan.html">version detection</a> signatures.  Dozens of
other important changes&mdash;and future plans for Nmap&mdash;are listed in the <a
href="stf/Nmap-4.50-Release.html">release announcement</a>.  We recommend that all current Nmap users <a href="https://nmap.org/download.html">upgrade</a>.

<p><b>Update</b>: Joe Barr at Linux.Com has written a <a href="http://www.linux.com/feature/125894">great review</a> of Nmap 4.50.  In addition to testing the new features, he offers substantial background information on port scanning.

<h2 class="purpleheader">Nmap Featured in The Bourne Ultimatum</h2>

<P>In <a href="http://www.amazon.com/dp/B000VWYJ86?tag=secbks-20">The Bourne Ultimatum</a> (<a href="http://imdb.com/title/tt0440963/">IMDB</a>), the CIA needs to hack the mail server of a newspaper (<a href="http://www.guardian.co.uk/">The Guardian UK</a>) to read the email of a reporter they assassinated.  So they turn to <a href="https://nmap.org">Nmap</a> and its new official GUI <a href="https://nmap.org/zenmap/">Zenmap</a> to hack the mail server!  Nmap reports that the mail server is running SSH 3.9p1, Posfix smtpd, and a name server (presumably bind).  They also make substantial use of <a href="http://en.wikipedia.org/wiki/Bash">Bash, the Bourne-again shell</a>.  Congratulations to Roger Chui for being the first to spot this.  He also sent a <a href="https://nmap.org/misc/bourne-transcript.html">scene transcript</a> and the following HD screen shots (click for full resolution):

<br><a href="https://nmap.org/movies/bourne/bourne-nmap-1.jpg">
<img width=400 height=250 src="https://nmap.org/movies/bourne/bourne-nmap-crop-400x250.jpg">
</a>

<a href="https://nmap.org/movies/bourne/bourne-nmap-2.jpg">
<img width=400 height=250 src="https://nmap.org/movies/bourne/bourne-nmap-2-cropscale-400x250.jpg">
</a>

<p>Other movies which have used Nmap include:
<a href="https://nmap.org/movies.html#matrix">Matrix Reloaded</a>,
<a href="https://nmap.org/movies.html#bourne">Bourne Ultimatum</a>,
<a href="https://nmap.org/movies.html#13game">13: Game of Death</a>,
<a href="https://nmap.org/movies.html#battleroyale">Battle Royale</a>,
<a href="https://nmap.org/movies.html#listening">The Listening</a>, and, uhh,
<a href="https://nmap.org/movies.html#haxxxor">HaXXXor: No Longer Floppy</a>.  Screens shots of Nmap in all of these movies are available on <a href="https://nmap.org/movies.html">our new Nmap movies page</a>.  Nmap has become quite the movie star!

<h2 class="purpleheader">Introducing Zenmap, the Official Nmap GUI</h2>

<P><a href="https://nmap.org/zenmap/"><img src="https://nmap.org/zenmap/images/zenmap-multi-thumb-392x225.png" border=0 align=right width=392 height=225></a>
<P>After more than two years of development (starting with a 2005 Google Summer of Code project), we have replaced the venerable but dated NmapFE with a new cross-platform GUI named <a href="https://nmap.org/zenmap/">Zenmap</a>.  It is cross platform (tested on Linux, Windows, Mac OS X) and supports all Nmap options.  Its results viewer allows easier browsing, searching, sorting, and saving of Nmap results.

<p>Zenmap will appear in the upcoming 4.50 release and is already available in the release candidate packages on the <a href="https://nmap.org/download.html">Nmap download page</a>.  Zenmap screenshots and documentation are available at <a href="https://nmap.org/zenmap/">https://nmap.org/zenmap</a>.

<p>Zenmap is still under active development, but was integrated early because it is already much more powerful than NmapFE.  Development is coordinated on the <a href="https://seclists.org/#nmap-dev">nmap-dev mailing list</a>.

<h2 class="purpleheader">Nmap Featured in Die Hard 4</h2>

<P>Yippee Ki-Yay! <a href="http://www.amazon.com/dp/B000VNMMR0?tag=secbks-20">In Die Hard 4: Live Free or Die Hard</a>
(<a href="http://en.wikipedia.org/wiki/Die_hard_4">Wikipedia</a>,
<a href="http://www.imdb.com/title/tt0337978/">IMDB</a>), Detective John McClane (Bruce Willis) is dispatched to retrieve hacker Matthew Farrell (Justin Long) because the FBI suspects him of breaching their computer systems.  Later, Justin is enlisted to help thwart terrorist mastermind Thomas Gabrial's attempts at total World destruction. In this Scene, Farrell demonstrates his Nmap skills:

<br><a href="https://nmap.org/movies/diehard4/nmap-diehard4-1080p-1920x801.jpg">
<img width=662 height=415 src="https://nmap.org/movies/diehard4/nmap-diehard4-1080p-cropscale-662x415.jpg"></a>

<p>Thanks to Andrew Hake for catching the cameo and sending <a href="https://nmap.org/movies/diehard4/">these</a> HD screen shots.

<p>See our <a href="https://nmap.org/movies.html">Nmap movies page</a> for many more movies featuring Nmap.

<h2 class="purpleheader">Top 100 Security Tools List Released</h2>

<p>
<a href="https://sectools.org/tools2006.html"><img src="https://sectools.org/awards/st2n-229x113.png" border=0 align=right width=229 height=113></a>
After the tremendously successful <a
href="https://sectools.org/tools2000.html">2000</a> and <a
href="https://sectools.org/tools2003.html">2003</a> top security tools
surveys, we are pleased to release our 2006 results at a brand new
site: <a href="https://sectools.org/tools2006.html">SecTools.Org</a>.  A record 3,243
Nmap users responded this year.  Notable trends since 2003 include the
rise in exploitation frameworks such as <a
href="https://sectools.org/tools2006.html#metasploit">Metasploit</a>, <a
href="https://sectools.org/tools2006.html#impact">Impact</a>, and <a
href="https://sectools.org/tools2006.html#canvas">Canvas</a>; the
increased popularity of wireless tools such as <a
href="https://sectools.org/tools2006.html#kismet">Kismet</a> and <a
href="https://sectools.org/tools2006.html#aircrack">Aircrack</a>.  44 tools
are new to the list.  Security practitioners are encouraged to read <a
href="https://sectools.org/tools2006.html">the list</a> and investigate tools they
aren't familiar with. You may find the little gem that you never knew
you needed.

<P>English Sectools Coverage:
<a href="http://www.digg.com/security/Insecure.org_Top_100_Network_Security_Tools_2006_List_Released_">Digg</a>,
<a href="http://it.slashdot.org/article.pl?sid=06/06/22/1338252&amp;threshold=2&amp;mode=nested&amp;commentsort=1">Slashdot</a>,
<a href="http://netsecurity.about.com/od/hackertools/a/top1002006.htm">About.Com</a>,
<a href="http://www.linuxsecurity.com/content/view/123264/2/">LinuxSecurity.Com</a>,
<a href="http://isc.sans.org/diary.php?storyid=1438">SANS ISC</a>,
<a href="http://taosecurity.blogspot.com/2006/06/sguil-makes-2006-top-100-security.html">TAOSecurity</a>,
<a href="http://del.icio.us/post?url=http%3A%2F%2Fsectools.org%2F&amp;title=http%3A%2F%2Fsectools.org&amp;copyuser=RangerRick&amp;jump=no&amp;partner=del">del.icio.us</a>,
<a href="http://blogs.securiteam.com/index.php/archives/459">SecuriTeam</a>,
<a href="http://www.ghacks.net/2006/06/22/top-100-network-security-tools/">gHacks</a>,
<a href="http://edge.i-hacked.com/top-100-network-security-tools-updated">iHacked</a>

<P>International:
<a href="http://meneame.net/story/100-mejores-herramientas-seguridad-para-redes">Men&eacute;ame</a> (Spanish),
<a href="http://www.kriptopolis.org/node/2435">Kriptopolis</a> (Spanish), <a href="http://itpro.nikkeibp.co.jp/article/NEWS/20060622/241551/">ITPro Security</a> (Japanese),
<a href="http://www.security.nl/article/13798/1/Top_100_security_tools_van_2006.html">Security.NL</a> (Dutch),
<a href="http://www.todo-linux.com/modules.php?name=News&amp;file=article&amp;sid=4584">Todo-Linux</a> (Spanish),
<a href="http://www.critical.lt/?news/590">CriticalSecurity</a> (Lithuanian),
<a href="http://xakep.ru/post/32373/default.asp">Xakep</a> (Russian)

<h2 class="purpleheader">SecLists.Org Back Up and Running</h2>

<P>Our popular <a href="https://seclists.org">SecLists.Org</a> public
mailing list archive is back up and running after it was <a
href="https://seclists.org/nmap-hackers/2007/0000.html">inexcusably
shut down</a> with no notice by our soon-to-be-former domain registrar
GoDaddy at the behest of MySpace.Com.  We believe web site content is the responsibility of the site owner (registrant) and (if that fails) hosting or bandwidth provider.  If the whois contact data is valid, registrars shouldn't be involved without a court order.

<P>News reports and discussion of the shutdown:<BR>
<a href="http://news.com.com/GoDaddy+pulls+security+site+after+MySpace+complaints/2100-1025_3-6153607.html">CNET News.Com</a> |
<a href="http://blog.wired.com/27bstroke6/2007/01/myspace_alleged.html">Wired</a> |
<a href="http://blog.wired.com/27bstroke6/2007/01/godaddy_defends.html">Wired #2</a> |
<a href="http://it.slashdot.org/article.pl?sid=07/01/26/1542218&amp;threshold=4">Slashdot</a> |
<a href="http://www.digg.com/tech_news/GoDaddy_makes_security_site_disappear_after_MySpace_complains">Digg</a> |
<a href="http://www.politechbot.com/2007/01/26/godaddy-pull-plug/">Politech</a> |
<a href="http://www.thewhir.com/blogs/Isabel-Wang/index.cfm/2007/1/26/GoDaddy-Takes-Down-Seclists">Web Host Industry Reviews</a> |
<a href="http://www.securityfocus.com/brief/418">SecurityFocus</a> |
<a href="http://www.infoworld.com/article/07/01/26/HNgodaddyshutterssite_1.html">Info World</a> |
<a href="http://domainnamewire.com/2007/01/26/godaddy-faces-pr-nightmare-over-domain-suspension/">Domain Name Wire</a> |
<a href="http://www.p2pnet.net/story/11147">P2PNet</a> |
<a href="http://www.securitypronews.com/insiderreports/insider/spn-49-20070126MySpaceAskedGoDaddyToDropSecLists.html">SecurityPro News</a> |
<a href="http://www.dmwmedia.com/news/2007/01/26/godaddy-yanks-security-site-offline-after-myspace-complaint">Digital MediaWire</a> |
<a href="http://blogs.securiteam.com/index.php/archives/803">SecuriTeam</a> |
<a href="http://www.techdirt.com/articles/20070125/102430.shtml">Tech Dirt</a> |
<a href="http://mashable.com/2007/01/25/myspace-godaddy/">Mashable</a>

<BR><P><B>Update:</B> We have launched <a href="http://nodaddy.com">NoDaddy.Com</a> to document GoDaddy's abuses of their registrar status.

<h2 class="purpleheader">Nmap 4.00 Released</h2>

<P>After two years of work since the <a href="https://insecure.org/stf/Nmap-3.50-Release.html">3.50 release</a>, Insecure.Org is pleased to <a
href="stf/Nmap-4.00-Release.html">announce</A> the immediate, free
availability of the Nmap Security Scanner version 4.00 from <a
href="https://nmap.org">https://nmap.org</a> .

<P>Changes since version 3.50 include a rewritten (for speed and memory efficiency) port scanning engine, ARP scanning, a brand new
<a href="https://nmap.org/book/man.html">man page</a> and
<a href="https://nmap.org/book/install.html">install guide</a>,
'l33t ASCII art, <a
href="https://nmap.org/book/man-runtime-interaction.html">runtime
interaction</a>, massive <a
href="https://nmap.org/book/vscan.html">version detection</a>
improvements, MAC address spoofing, increased Windows performance, 500 new OS
detection fingerprints, and completion time estimates.  Dozens of
other important changes -- and future plans for Nmap -- are listed in the <a
href="stf/Nmap-4.00-Release.html">release announcement</a>.

<p><b>Updates:</b><BR>
 Fyodor has given a <a href="http://www.securityfocus.com/columnists/384">SecurityFocus interview</a> on 4.00<BR>
More English coverage/reviews: <a href="http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1186583,00.html">Information Security Magazine</a>, <a href="http://it.slashdot.org/article.pl?sid=06/01/31/191256&amp;threshold=3&amp;mode=nested&amp;commentsort=3">Slashdot</a>, <a href="http://lwn.net/SubscriberLink/171828/6e79baec801b5d33/">Linux Weekly News (LWN)</a>, <a href="http://www.digg.com/security/NMAP_4.0_Released">Digg</a>, <a href="http://isc.sans.org/diary.php?storyid=1087">SANS ISC</a>, <a href="http://www.osnews.com/story.php?news_id=13534">OSNews</a>, <a href="http://allyourtech.com/content/news/01_02_2006_nmap_4_00_released.php">AllYourTech.Com</a>, <a href="http://www.linuxsecurity.com/content/view/121460/65/">LinuxSecurity.Com</a><BR>
International coverage: <a href="http://www.heise.de/newsticker/meldung/69101">Heise</a> (German), <a href="http://linuxfr.org/2006/02/01/20303.html">LinuxFR</a> (French), <a href="http://www.opennet.ru/opennews/art.shtml?num=6903">OpenNET</a> (Russian), <a href="http://derstandard.at/?url=/?id=2326619">derStandard</a> (Austrian), <a href="http://www.golem.de/0602/43078.html">Golem.de</a> (German), <a href="http://hacking.pl/5730">Hacking.PL</a> (Polish), <a href="http://www.winfuture.de/news,24002.html">WinFuture</a> (German), <a href="http://www.kriptopolis.org/node/1776">Kriptopolis</a> (Spanish), <a href="http://www.security.nl/article/12864/1/Nieuwe_versie_Nmap_security_scanner.html">Security.NL</a> (Dutch), <a href="http://tweakers.net/meuktracker/11730">Tweakers.Net</a> (Dutch), <a href="http://www.xakep.ru/post/29901/default.asp">Xakep</a> (Russian)

<h2 class="purpleheader">Security List Archive Updated</h2>

<P>RSS feeds have been added to all security mailing lists archived at
<a href="https://seclists.org">SecLists.Org</a>, making it even
easier to keep up with the latest news from <a href="https://seclists.org/#nmap-hackers">Nmap-Hackers</a>, <a href="https://seclists.org/#nmap-dev">Nmap-Dev</a>,
<a href="https://seclists.org/#bugtraq">Bugtraq</a>, and all of the others. We have also added <a href="https://seclists.org/#dailydave">Dailydave</a>, a
highly technical discussion list covers vulnerability research,
exploit development, and security events/gossip (with many smart
people participating).

<h2 class="purpleheader">NSA Loads Nmap Release Status for President Bush Visit</h2>

US President George W. Bush visited the NSA headquarters at Fort
Meade in January 2006.  A wall-sized status screen in the background
displays the latest versions of Nmap and some of our other <a href="https://sectools.org">favorite open source tools</a>.  Pictures were printed in the
February 6, 2006 edition of Newsweek (<a href="http://www.msnbc.msn.com/id/11079547/site/newsweek/">article</a>) and the Jan 27 Washington Post (<a href="http://www.washingtonpost.com/wp-dyn/content/article/2006/01/26/AR2006012601990.html">article</a>).  The page on the screen is the <a href="http://www.securitywizardry.com/radar.htm">Talisker Radar</a>.  We don't like the <a href="http://www.nsa.gov/">NSA</a> tracking our phone calls and email, but they may track Nmap releases all they want.<BR>
<a href="nmap/images/wash-post-nsa.jpg"><img src="nmap/images/wash-post-nsa-crop-490x130.jpg" height="130" width="490"></a>
<P>Loading an external web site on their giant screen was risky.  Imagine if <a href="nmap/images/nsadware.jpg">this happened</a> (thanks <a href="https://seclists.org/fulldisclosure/2006/Feb/0082.html">php0t</a>)!
<BR>Meanwhile, Nmap makes an appearance at Walmart with the <a href="https://insecure.org/stf/walmart-nmap-chair.jpg">Nmap hacking chair</a>

<h2 class="purpleheader">New Nmap Man Page</h2>

<P>We are proud to <a
href="https://seclists.org/nmap-hackers/2005/Oct-Dec/0001.html">announce</a>
that the Nmap man page has been completely rewritten.  It is more
comprehensive (double the length) and much better organized than the
previous one.  It is meant to serve as a quick-reference to virtually
all Nmap command-line arguments, but you can learn even more about
Nmap by reading it straight through. The 18 sections include <a
href="https://nmap.org/book/man-briefoptions.html">Brief
Options Summary</a>, <a
href="https://nmap.org/book/man-bypass-firewalls-ids.html">Firewall/IDS
Evasion and Spoofing</a>, <a
href="https://nmap.org/book/man-performance.html">Timing
and Performance</a>, <a
href="https://nmap.org/book/man-port-scanning-techniques.html">Port
Scanning Techniques</a>, <a
href="https://nmap.org/book/man-examples.html">Usage
Examples </a>, and much more.  It even documents some cool features
that are slated for release in the next Nmap version (<a
href="https://nmap.org/book/man-runtime-interaction.html">runtime
interaction</a> and parallel DNS resolution).

<P>The new man page is best read in <a
href="https://nmap.org/book/">HTML format</a>, though you
can alternatively download the <a
href="https://nmap.org/data/nmap.1">Nroff nmap.1</a> to
install on your system.

<P>We have issued a call for translations of the reference guide, and 29 languages are in progress.  See the <a href="nmap/docs.html">new documentation page</a> to volunteer or read a translation.

<h2 class="purpleheader">Hacker Fiction Books Published</h2>

<TABLE CELLPADDING=0 CELLSPACING=10>
<TR><TD>
<a href="/stc/"><img border=0 width=95 height=125 src="stc/images/cover_95_125.gif"></a><br>
</TD><TD>
Fyodor has co-authored a novel on hacking, along with FX, Joe Grand,
Kevin Mitnick, Ryan Russell, Jay Beale, and several others.
Their individual stories combine to describe a massive electronic
financial heist.  While the work is fiction, hacks are described in
depth using real technology such as Nmap, Hping2, OpenSSL, etc.  Stealing the Network: How to Own a Continent can be <a
href="http://www.amazon.com/dp/1931836051?tag=secbks-20">purchased
at Amazon (save $17)</a>, and your can <a href="/stc/">read
Fyodor's chapter online for free</a>.  STC was a best-seller, ranking for a while as the second-highest selling
computer book on Amazon.
</TD></TR>
<TR><TD>
<a href="/stc/sti.html"><img border=0 width=95 height=125 src="stc/images/sti_cover_95x125.gif"></a><br>
</TD><TD>
<b>Update</b>: Syngress has released a sequel: <a href="http://www.amazon.com/dp/1597490067?tag=secbks-20">Stealing the Network: How to Own an Identity</a>.  They have generously allowed Fyodor to post his favorite chapter for free.  So enjoy <a href="stc/sti.html">Bl@ckTo\/\/3r</a>, by Nmap contributor Brian Hatch.  It is full of wry humor and creative security conundrums to keep the experts entertained, while it also offers security lessons on the finer points of SSH, SSL, and X Windows authentication and encryption.
</TD></TR></TABLE>

<h2 class="purpleheader">Nmap Gains Advanced Version Detection</h2>

<P>After several months of intense private development, we are pleased to <A HREF="https://seclists.org/nmap-hackers/2003/Jul-Sep/0005.html">release Nmap 3.45</A>, including an advanced <A HREF="https://nmap.org/book/vscan.html">version detection system</A>.  Now instead
of using a simple nmap-services table lookup to determine a port's
likely purpose, Nmap will (if asked) interrogate that TCP or UDP
port to determine what service is really listening. In many cases it
can determine the application name and version number as well.
Obstacles like SSL encryption and Sun RPC are no threat, as Nmap can
connect using OpenSSL (if available) as well as utilizing Nmap's RPC
bruteforcer. IPv6 is also supported.  You can read our new <A
HREF="https://nmap.org/book/vscan.html">version detection paper</A> for the
details and examples, or just download the latest version and try it
out <A HREF="nmap/">here</A>.  Simply add "-sV" to your normal scan
command-line options.
<BR><BR>News articles covering Nmap version detection: <A HREF="http://slashdot.org/article.pl?sid=03/09/16/133228&amp;startat=&amp;threshold=5&amp;mode=nested&amp;commentsort=3&amp;op=Change">Slashdot</A>, <A HREF="http://www.hackinglinuxexposed.com/articles/20031006.html">Hacking Linux Exposed</A>, <A HREF="nmap/press/securitywiredigest77.html">Security Wire Digest</A>.

<h2 class="purpleheader">Nmap Featured in The Matrix Reloaded</h2>

<P>We have all seen many movies like <A
HREF="http://us.imdb.com/Title?0113243">Hackers</A> which pass off
ridiculous 3D animated eye-candy scenes as hacking.  So I <A
HREF="https://seclists.org/nmap-hackers/2003/Apr-Jun/0010.html">was
shocked</A> to find that Trinity does it properly in <A HREF="http://us.imdb.com/Title?0234215">The Matrix Reloaded</A> [<a href="http://www.amazon.com/dp/B0000AXE8I?tag=secbks-20">Under $6 at Amazon</a>].
She whips out <A HREF="https://nmap.org/">Nmap</A> version
<A HREF="https://seclists.org/nmap-hackers/2001/Apr-Jun/0005.html">2.54BETA25</A>, uses
it to find a vulnerable SSH server, and then proceeds to exploit it
using the <A
HREF="http://packetstormsecurity.org/advisories/bindview/adv_ssh1crc.txt">SSH1
CRC32</A> exploit from 2001.
Shame on them for being vulnerable (<A
HREF="https://insecure.org/stf/neiljk.html">timing notes</A>). Congratulations to <A HREF="/nmap/changelog.html">everyone</A> who has helped
make Nmap successful!  Click on these thumbnails for higher resolution or view <A
HREF="https://nmap.org/movies/matrix/">more pictures
here</A>.

<br><a href="https://nmap.org/movies/matrix/trinity-hacking-hd-crop-960x728.jpg"><img width=302 height=250 src="https://nmap.org/movies/matrix/trinity-hacking-hd-cropscale-302x250.jpg"></a>


<a href="https://nmap.org/movies/matrix/trinity-nmapscreen-hd-crop-1200x728.jpg"><img width=418 height=250 src="https://nmap.org/movies/matrix/trinity-nmapscreen-hd-cropscale-418x250.jpg"></a>


<BR><B>Updates:</B>
<UL>
<LI>News articles about the Nmap cameo:
<A HREF="http://news.bbc.co.uk/1/hi/technology/3039329.stm">BBC</A>,
<A HREF="http://slashdot.org/article.pl?sid=03/05/18/1416213&amp;mode=nested&amp;threshold=4&amp;commentsort=3">Slashdot</A>,
<A HREF="http://www.securityfocus.com/news/4831">SecurityFocus</A>,
<A HREF="http://silicon.com/roundup/500021-500018/1/4333.html">Silicon.Com</A>,
<A HREF="http://news.com.com/2009-1088-984352.html?tag=fd_rndm">CNET</A>
<LI><A HREF="http://www.jwz.org">JWZ</A> has added this cracking scene as an <A HREF="http://www.jwz.org/xscreensaver/">XScreenSaver</A> 4.10 Easter Egg - run 'xmatrix -small -crack'.
<LI><A HREF="http://www.lab6.com">Dave from Lab6</A>
notifies me that Nmap source code is displayed in <A
HREF="http://us.imdb.com/Title?0266308">Battle Royale</A>:
[<A HREF="https://nmap.org/movies/matrix/Battle_Royale_Nmap_br943.jpg">Screen1</A>]
[<A HREF="https://nmap.org/movies/matrix/Battle_Royale_Nmap_br946.jpg">Screen2</A>] [<A HREF="http://us.imdb.com/Trivia?0266308">Trivia</A>]
<LI>Several people have submitted matrix-themed banners to the <A HREF="/nmap/nmap_propaganda.html">propaganda gallery</a>.  Feel free to use any of these to link to Insecure.org - we appreciate it!
<LI>The UK's Scotland Yard Computer Crime Unit and the British Computer Society have put out a <A HREF="http://web.archive.org/web/20051230150409/http://www.bcs.org/BCS/News/PressReleases/2003/May/PressReleases2003MayMatrixTricksWarning.htm">joint warning</a> that "Viewers of the new box office blockbuster 'Matrix Reloaded' should not be tempted to emulate the realistic depiction of computer hacking."  Kids - don't try this at home!
</UL>
<BR><BR>

</main><!-- content -->

<footer id="nst-foot">
   <form class="nst-search" id="nst-foot-search" action="/search/">
    <input class="nst-search-q" name="q" type="search" placeholder="Site Search">
    <button class="nst-search-button" title="Search">
     <img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true"
      src="/shared/images/nst-icons.svg#search">
     </button>
   </form>
<div class="flexlists">
<div class="fl-unit">
<h2><a class="nlink" href="https://nmap.org/">Nmap Security Scanner</a></h2>
<ul>
<li><a class="nlink" href="https://nmap.org/book/man.html">Ref Guide</a>
<li><a class="nlink" href="https://nmap.org/book/install.html">Install Guide</a>
<li><a class="nlink" href="https://nmap.org/docs.html">Docs</a>
<li><a class="nlink" href="https://nmap.org/download.html">Download</a>
<li><a class="nlink" href="https://nmap.org/oem/">Nmap OEM</a>
</ul>
</div>
<div class="fl-unit">
<h2><a class="nlink" href="https://npcap.com/">Npcap packet capture</a></h2>
<ul>
<li><a class="nlink" href="https://npcap.com/guide/">User's Guide</a>
<li><a class="nlink" href="https://npcap.com/guide/npcap-devguide.html#npcap-api">API docs</a>
<li><a class="nlink" href="https://npcap.com/#download">Download</a>
<li><a class="nlink" href="https://npcap.com/oem/">Npcap OEM</a>
</ul>
</div>
<div class="fl-unit">
<h2><a class="nlink" href="https://seclists.org/">Security Lists</a></h2>
<ul>
<li><a class="nlink" href="https://seclists.org/nmap-announce/">Nmap Announce</a>
<li><a class="nlink" href="https://seclists.org/nmap-dev/">Nmap Dev</a>
<li><a class="nlink" href="https://seclists.org/fulldisclosure/">Full Disclosure</a>
<li><a class="nlink" href="https://seclists.org/oss-sec/">Open Source Security</a>
<li><a class="nlink" href="https://seclists.org/dataloss/">BreachExchange</a>
</ul>
</div>
<div class="fl-unit">
<h2><a class="nlink" href="https://sectools.org">Security Tools</a></h2>
<ul>
<li><a class="nlink" href="https://sectools.org/tag/vuln-scanners/">Vuln scanners</a>
<li><a class="nlink" href="https://sectools.org/tag/pass-audit/">Password audit</a>
<li><a class="nlink" href="https://sectools.org/tag/web-scanners/">Web scanners</a>
<li><a class="nlink" href="https://sectools.org/tag/wireless/">Wireless</a>
<li><a class="nlink" href="https://sectools.org/tag/sploits/">Exploitation</a>
</ul>
</div>
<div class="fl-unit">
<h2><a class="nlink" href="https://insecure.org/">About</a></h2>
<ul>
<li><a class="nlink" href="https://insecure.org/fyodor/">About/Contact</a>
<li><a class="nlink" href="https://insecure.org/privacy.html">Privacy</a>
<li><a class="nlink" href="https://insecure.org/advertising.html">Advertising</a>
<li><a class="nlink" href="https://nmap.org/npsl/">Nmap Public Source License</a>
</ul>
</div>
<div class="fl-unit social-links">
<a class="nlink" href="https://twitter.com/nmap" title="Visit us on Twitter">
 <img width="32" height="32" src="/shared/images/nst-icons.svg#twitter" alt="" aria-hidden="true">
 </a>
<a class="nlink" href="https://facebook.com/nmap" title="Visit us on Facebook">
 <img width="32" height="32" src="/shared/images/nst-icons.svg#facebook" alt="" aria-hidden="true">
 </a>
<a class="nlink" href="https://github.com/nmap/" title="Visit us on Github">
 <img width="32" height="32" src="/shared/images/nst-icons.svg#github" alt="" aria-hidden="true">
 </a>
<a class="nlink" href="https://reddit.com/r/nmap/" title="Discuss Nmap on Reddit">
 <img width="32" height="32" src="/shared/images/nst-icons.svg#reddit" alt="" aria-hidden="true">
 </a>
</div>
</div>
</footer>

</div><!-- wrapper -->
</body>
</html>


Resolver

Resolver ASN
AS34927
Resolver IP
45.134.88.121
Resolver Network Name
iFog GmbH
Report ID
20241204T075514Z_webconnectivity_IS_51896_n1_6a9w023v5oHWcSvk
Platform
windows
Software Name
ooniprobe-desktop-unattended (3.14.1)
Measurement Engine
ooniprobe-engine (3.14.1)

Raw Measurement Data

Loading