- Securing Network Infrastructure
- Sairam Jetty Sagar Rahalkar
- 63字
- 2021-08-20 10:15:27
How it works…
Once the user selects the type of scan and the various other options provided by Zenmap and proceeds to scan, the Zenmap interface will call the Nmap engine in the backend to perform similar operations to the command-line interface:
Zenmap also provides various other options to filter the hosts, compare results, search scan results, save scan results, and more.