From 76fe08fbdb4e09c36af9d51e8d43fc407700ea9b Mon Sep 17 00:00:00 2001 From: Josh <13081611+joshmate@users.noreply.github.com> Date: Sat, 23 Mar 2019 17:07:02 -0700 Subject: [PATCH] Added info on nmap and Zenmap (#24718) * Added info on nmap and Zenmap Added the text: " (Network Mapper) which is a open source utility to assist with network discovery and security auditing. There is also a graphical user interface called Zenmap. These are useful tools with functions allowing a user to obtain.." * fix: closed li element --- guide/english/security/scanning/index.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/guide/english/security/scanning/index.md b/guide/english/security/scanning/index.md index 786dba296d5..53f7c257e79 100644 --- a/guide/english/security/scanning/index.md +++ b/guide/english/security/scanning/index.md @@ -73,7 +73,7 @@ Approximate round trip times in milliseconds: --> ## Scanning Tools -There are many tools available to scan but one of the most common is `nmap`. It's a useful tool with functions such as getting information about live hosts on a network, services that are running, and the types and versions of the operating system being used. +There are many tools available to scan but one of the most common is `nmap` (Network Mapper) which is a open source utility to assist with network discovery and security auditing. There is also a graphical user interface called Zenmap. These are useful tools with functions allowing a user to obtain information about live hosts on a network, services that are running, and the types and versions of the operating system being used. ## More Information: - How to Ping in Linux https://www.wikihow.com/Ping-in-Linux @@ -81,6 +81,6 @@ There are many tools available to scan but one of the most common is `nmap`. It' ## Sources
    -
  1. Summarizing The Five Phases of Penetration Testing. (2015, May 06). Retrieved October 26, 2017, from https://www.cybrary.it/2015/05/summarizing-the-five-phases-of-penetration-testing/
  2. +
  3. Summarizing The Five Phases of Penetration Testing. (2015, May 06). Retrieved October 26, 2017, from https://www.cybrary.it/2015/05/summarizing-the-five-phases-of-penetration-testing/
  4. Engebretson, P. (2013). The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Ed. 2. Syngress.
  5. -
\ No newline at end of file +