Nmap Security Scanner
*Ref Guide
Security Lists
Security Tools
Site News
Advertising
About/Contact
Credits
Sponsors





Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
Chapter 12. Zenmap GUI Users' Guide
Prev   Next

Chapter 12. Zenmap GUI Users' Guide

Table of Contents

Introduction
Scanning
Profiles
Scan tabs
Interpreting scan results
Scan results tabs
Sorting by host
Sorting by service
Saving and loading scan results
The recent scans database
The Nmap command constructor wizard
The profile editor
Creating a new profile
Profile meta-information
Editing a profile
Deriving a new profile from an old one
Searching through results
Comparing results
Graphical comparison
Text comparison
Files used by Zenmap
The nmap executable
System configuration files
Per-user configuration files
Description of zenmap.conf
Sections of zenmap.conf
Command line options
Synopsis
Option summary
Output redirection and debugging
History

Introduction

Zenmap is the official graphical user interface for the Nmap Security Scanner. It is a multi-platform, free and open-source application designed to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles to make them easy to run repeatedly. A command creator allows interactive creation of Nmap command lines. Scan results can be saved and viewed later. Saved scan results can be compared with one another to see how they differ. The results of recent scans are stored in a searchable database. A typical Zenmap screenshot is provided by Figure 12.1, “Typical Zenmap screenshot” See the official Zenmap web page for more screen shots.

Figure 12.1. Typical Zenmap screenshot

Typical Zenmap screenshot

This guide is meant to make it easy to use Nmap and Zenmap together, even if you have used neither before. For the parts of this guide that deal specifically with Nmap (command line options and such), refer to the Nmap Reference Guide (see Chapter 15, Nmap Reference Guide).


Prev   Next
Chapter 11. Defenses Against Nmap Home Scanning
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]