How it works...

These different formats help the user to utilize the reports for multiple operations and analyse the reports in different ways. The port scan results represent a critical phase of reconnaissance, which allows the users to further plan the vulnerability scan and detection activities. These reports are then uploaded to different tools and sites for further analysis and scanning. It is also worth mentioning that Nmap is a background utility for various vulnerability scanning software. Once these reports are generated, these tools use the same to perform further actions.

Get Network Scanning Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.