118
◾
Ethical Hacking and Penetration Testing Guide
I guess I have talked about every parameter that they have used in their scanning profiles. So just
take some time to understand
the scanning profiles, their function, and most importantly what
they are doing in background by inspecting the packets through wireshark.
The topology option inside zenmap will draw a picture of the network topology. In this way
you can visualize where exactly the host is located.