Introduction

In this chapter, we will be going through various recipes regarding the reports that can be generated using Nmap and Nessus. We will also look at a recipe on using Nmap to confirm vulnerabilities that are reported by Nessus. It is always required to confirm the vulnerabilities reported by a scanner, as there are chances of the scanner reporting false positive vulnerabilities. Confirming these vulnerabilities will allow the administrative team to focus on the confirmed vulnerabilities instead of wasting resources on false positives that have been reported. Both Nmap and Nessus generate different formats of reports, allowing the user to make a choice as per their requirements.

Get Network Scanning Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.