It was best of breed then, and is up there with the most successful open source projects - certainly in the security space, but maybe even anywhere.
Hats off to Fyodor and the rest of the team. This looks like really excellent work.
If you get a new device run a full scan against the device; all ports, OS detection and full service version scan.
Here is the page if you are curious:
# nmap -v -v -Pn -O -sV --version-all -p 1-65535 -oA output 192.168.0.1
I wonder if Hollywood will upgrade.
Have you reported it on the nmap-dev mailing list with packet dumps?
We also felt that the old -sP ("ping scan") option was a bit misleading because current versions of Nmap can go much further (including -sC and --traceroute) even with port scans disabled. We will retain support for the previous option names for the foreseeable future.
Get a copy and start scanning, don't just scan your web servers and Internet gateway. Have a crack at your Internet connected TV, WII and any other device that has an IP Address. If nothing else its fun. :)
Definitely do this. I can especially recommend it if you're a bored teenager. I learned a lot back in the day from abusing cheap gear like printers, routers and stuff.
I'm really tempted to set up a gopher server on an IPv6-only host, just to try this out. While perhaps pointless, it's a testament to open source that NMAP includes this.