Nmap is a very useful network tool. It is an open source security/port scanner, released under GPL.
The project is very active (last release was 4 days ago at time of writing).
Zenmap is the GUI interface to Nmap.
The only major issue is that much like wireshark, Nmap requires the winpcap driver.
I see quite a few threads requesting Nmap/Zenmap (https://portableapps.com/search/node/nmap), yet we've still not got an official release.
I'd like to see one...
If you found those threads then you should have posted under the old threads not created a new one..... Also usually with drivers it is almost impossible to do it as a PortableApp because to install a driver you need admin privileges.
But still welcome to PortableApps.com
Thanks,
Bensawsome
iLike Macs, iPwn, However you put it... Apple is better ^_^
"Claiming that your operating system is the best in the world because more people use it is like saying McDonalds makes the best food in the world..."
New threads mean more traffic for portable apps, so I don't see what difference it makes...
Besides, really, although those threads mentioned Nmap, nothing has been done about it.
This thread is about trying to get it portable
The goal is efficient group communication.
I will add something: WiresharkPortable works around the WinPcap issue by installing it when run, and uninstalling it upon termination. If it is already on the machine, it will use the WinPcap already locally installed rather than installing/uninstalling.
I am considering doing a portable version of those. I have the files downloaded, and will reference WireShark for the driver.
Understand that use of a driver is complex. Understand that these are programs that will do alot. Some is black hat some is white hat.
Too many lonely hearts in the real world
Too many bridges you can burn
Too many tables you can't turn
Don't wanna live my life in the real world
As a systems administrator, I find Nmap useful to scan my own systems to double check what services are open and running. Not that I really need to justify myself.
There's plenty of discussion over using networks tools for black/white uses, I propose that this isn't one of them.
Besides, hackers and security experts are almost the same.
If wireshark can be done, so can Nmap, i'd like to see it, it's a useful tool that I'd love to have on my USB drive.
In fact, I look forward to it.
Any update?
I commend you for your patience. However, I haven't taken the time to work on it. I just installed it on my main pc. I need to go threw and update a lot of things, but I haven't taken the time, yet.
Perhaps I will try it.
Too many lonely hearts in the real world
Too many bridges you can burn
Too many tables you can't turn
Don't wanna live my life in the real world
Heh thanks.
I must say, I'm not known for my patience, but I'm in no rush for this, it's just something that's on my wish list.
I'm sure I could have a bash myself but I think I'll delegate this one to you as you seem to be on the right track.
Good luck and thanks.
I've got a version of zenmap working. Driver is next. So, maybe in a couple of weeks.
Too many lonely hearts in the real world
Too many bridges you can burn
Too many tables you can't turn
Don't wanna live my life in the real world
here you go:
https://portableapps.com/node/19800
Too many lonely hearts in the real world
Too many bridges you can burn
Too many tables you can't turn
Don't wanna live my life in the real world
Thanks very much!
As someone who doesn't strictly *need* this tool but has long loved it after years working in computer security, I appreciate your work on this. I'll echo hm2k's appreciation and say "Thank you" as well.
If you use the right command Nmap can be run without privileges or drivers. It is limited but still very useful.
Extract the Nmap installation into a directory.
Assuming that the host in question is 10.10.10.254, from the nmap directory run nmap in unprivileged mode like the example below:
nmap --unprivileged -PT80,443 -sT 10.10.10.254
Works great and gives me what I need without needing to install drivers or have admin rights.
Nmap scan report for 10.10.10.254
Host is up (0.00018s latency).
Not shown: 994 filtered ports
PORT STATE SERVICE
23/tcp open telnet
80/tcp open http
81/tcp open hosts2-ns
85/tcp open mit-ml-dev
139/tcp open netbios-ssn
445/tcp open microsoft-ds
If you have admin rights you can also get a fingerprint, but it must be run as admin for that to work:
nmap --unprivileged -PT80,443 -O -sT 10.10.10.254