**Note: The content in this article is only for educational purposes and understanding of cybersecurity concepts. It should enable people and organizations to have a better grip on threats and know how to protect themselves against them. Please use this information responsibly.**
- Scanning nmap normally. This generates huge traffic as Nmap will be performing ping sweep as well.
- So to avoid making additional requests to the targeting machine, we include the following flags in the command which generates detailed reports with less traffic and save the output in xml format.
- -v -> verbosity
- -Pn -> blocking ping sweep
- -n ->blocks reverse DNS lookup
- -p- -> scans all 65535 ports
- -sV -> service version
- -sC -> running default scripts
- -oX -> save the output in xml format
- Converting the report to .html extension using xsltproc so that the report can be viewed by the browser.
- The result shown here in firefox is organized and easier to understand because it is in GUI rather than the report we got in shell in step 2.