Monday, February 10, 2025
HomeNetwork PentestingNmap 7.80 Released - 80+ New Improvements, Bug Fixes, New Npcap, NSE...

Nmap 7.80 Released – 80+ New Improvements, Bug Fixes, New Npcap, NSE Scripts/libs

Published on

SIEM as a Service

Follow Us on Google News

The new version of Nmap 7.80 released in Defcon, Vegas by Gordon Fyodor, network security and created of Nmap.

This new version of Nmap 7.80 upgraded with more than 80 new cross-platform improvements, fixed some of the critical bugs, added new Npcap, and NSE scripts/libs.

What is Nmap?

Nmap is a free and open-source network scanner, Port Scanner, & Network Exploration Tool that support in all the cross platforms including Linux, Windows, UNIX, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more.

“Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning.”

It has been a year since Nmap received the last update (Nmap 7.70) and the main reason for the delay is to spending more time with the improvement of Npcap Windows packet capturing driver.

Npcap is based on the discontinued WinPcap library, but it has significantly improved speed, portability, security, and efficiency. Npcap works on Windows 7 and later windows version.

New Nmap 7.80 release not only benefiting for windows but its support for cross-platform with a bunch of new libraries, performance improvement.

Nmap 7.80 Improvements in Npcap

New changes in Npcap Windows packet capturing library is more faster and stable than other previous releases.

“Nmap 7.80 updates the bundled Npcap from version 0.99-r2 to 0.9982, including all of these changes from the last 15 Npcap releases.”

NSE (Nmap Search Engine)

In NSE() improvements, new Nmap 7.80 added 11 NSE scripts, from 8 authors, bringing the total up to 598.

Nmap 7.80 source code and binary packages for Linux, Windows, and Mac are available for free download here.

You can find here the full list of significant changes that applied in Nmap 7.80 and also you can read the Full Nmap tutorial.

Sponsored:  â€“ Manage all the Endpoint networks from a single Console.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

UK Pressures Apple to Create Global Backdoor To Spy on Encrypted iCloud Access

United Kingdom has reportedly ordered Apple to create a backdoor allowing access to all...

Autonomous LLMs Reshaping Pen Testing: Real-World AD Breaches and the Future of Cybersecurity

Large Language Models (LLMs) are transforming penetration testing (pen testing), leveraging their advanced reasoning...

Securing GAI-Driven Semantic Communications: A Novel Defense Against Backdoor Attacks

Semantic communication systems, powered by Generative AI (GAI), are transforming the way information is...

Cybercriminals Target IIS Servers to Spread BadIIS Malware

A recent wave of cyberattacks has revealed the exploitation of Microsoft Internet Information Services...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Exploit 3,000 ASP.NET Machine Keys to Hack IIS Web Servers Remotely

Microsoft has raised alarms about a new cyber threat involving ViewState code injection attacks...

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

NFS Protocol Security Bypassed To Access Files From Remote Server

The NFS protocol offers authentication methods like AUTH_SYS, which relies on untrusted user IDs,...