{"id":32118,"date":"2024-02-23T07:39:03","date_gmt":"2024-02-23T07:39:03","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=32118"},"modified":"2024-02-23T07:39:07","modified_gmt":"2024-02-23T07:39:07","slug":"nmap-analysis-tool","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/","title":{"rendered":"Nmap Analysis Tool &#8211; Enhancing Network Security Through Advanced Analysis And Reporting"},"content":{"rendered":"\n<p>This CLI python script is designed to be used by security consultants, IT admins and network engineers to do two things, compare two Nmap XML files to create a spreadsheet that compares IPs, ports and services between the files, and create a markdown report using GPT.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Screenshots<\/strong><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEii1617EgqwB2SASox3fLQJDoakjvbCcOefh_DIYSeCoflLm0bksvrBM-JHq7BP-bYb0H7q3YUksyNwGwRtaSuWvVOsCxTKlTwyj2pq9eUt0zPsBligrQFTK9KZQUS88cKSEzi9U3q2Ko7b9KYYQytpa8lpUO_xn85MT5TE6F2D095i5bAeNSFTVGAAZxXA\/s16000\/spreadsheet.webp\" alt=\"\"\/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjBpEqzLvVb3-s7FA3sEkKn4SV84ocKoAadE9xBAzsWpgWic2lb-rRPB7dmgr4cbFP2E0mB4oFR2wdGOLYZ_xZtUzPaCjNCx4vq1mbYnzO7A_pUxsQCHbv4F_1s14UJISxgYoOQbYcXJ84UbeXNF97CVlR4nd7puNigFUNgW4jNTEtfqwfvEhkTiVEbTBTs\/s16000\/spreadsheet-pie.webp\" alt=\"\"\/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjnEKSKqDEN-YewRZALmeBMhFkLNiHcn5PRC5yFlgdlLiihsNZBV7D7AURn-ErjVHqH-_Of2Hu4T4abP9kEHblP-9dE0sNneb0Xv9G6h2qDIT7pQuLgkVf8OSWC6-lJPJ2PhMXuFpvcjj183_yaCZwK37-fmmCKRMqS8S8gD6mEovUpz9mZX_TagWxDhKRL\/s16000\/gpt-report.webp\" alt=\"\"\/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>Features<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/FlyingPhish\/Nmap-Analysis#comprehensive-nmap-xml-parsing\"><\/a><strong>Comprehensive Nmap XML Parsing<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Multiple File Support<\/strong>: Parse and analyze two Nmap XML output files.<\/li>\n\n\n\n<li><strong>Structured Data<\/strong>: Converts Nmap&#8217;s XML output into a structured format for further processing.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/FlyingPhish\/Nmap-Analysis#comparative-analysis\"><\/a><strong>Comparative Analysis<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Change Detection<\/strong>: Compare results from two Nmap scans to identify new, altered, or removed services and ports. Useful for when you scan the same IPs from different source IPs or over time.<\/li>\n\n\n\n<li><strong>Excel Reporting<\/strong>: Automatically generates detailed Excel spreadsheets with the comparison results and some stats.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/FlyingPhish\/Nmap-Analysis#statistical-overview-and-visualization\"><\/a><strong>Statistical Overview And Visualization<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Network Exposure Statistics<\/strong>: Offers statistical analysis on detected services and open ports.<\/li>\n\n\n\n<li><strong>Excel Visualizations<\/strong>: Includes pie charts in Excel reports for a graphical representation of the network&#8217;s security posture.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/FlyingPhish\/Nmap-Analysis#ai-powered-insights-with-gpt\"><\/a><strong>AI-Powered Insights With GPT<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>GPT Report Generation<\/strong>: Uses OpenAI&#8217;s GPT to generate insightful analysis reports based on Nmap result stats. The tool uses a hardcoded prompt that sets the tone and requirements, then the script inserts the stats (no identifying information is provided) and if -c &#8211;context has been provided, it&#8217;ll add the context to the bottom of the prompt.<\/li>\n\n\n\n<li><strong>Customizable Context<\/strong>: Enhance GPT analysis by providing additional context, tailoring the report to specific needs.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/FlyingPhish\/Nmap-Analysis#usage\"><\/a><strong>Usage<\/strong><\/h2>\n\n\n\n<p>The script prints the help page if no args are passed, or you can access with&nbsp;<code>python nmap-analysis.py -h<\/code><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Comparing Nmap Scans<\/strong>:<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>python nmap-analysis.py compare -ff (--first-nmap-file) path\/to\/first.xml -lf (--last-nmap-file) path\/to\/second.xml<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Generating a GPT Report<\/strong>:<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>python nmap-analysis.py gpt-report -gf (--gpt-nmap-file) path\/to\/nmap.xml -c (--context) \"Your optional context here\"<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Installation and Setup<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/FlyingPhish\/Nmap-Analysis#prerequisites\"><\/a><strong>Prerequisites<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>3.10+ probably (created using 3.12)<\/li>\n\n\n\n<li>An OpenAI API key for GPT report generation that is set in local env<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/FlyingPhish\/Nmap-Analysis#secure-installation-with-venv\"><\/a><strong>Secure Installation with\u00a0<code>venv<\/code><\/strong><\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Clone the Repository<\/strong>:<\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-code\"><code>git clone https:\/\/github.com\/yourusername\/nmap-analysis-tool.git\r\ncd nmap-analysis-tool<\/code><\/pre>\n\n\n\n<p>2. <strong>Create a Virtual Environment<\/strong>:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>python3 -m venv venv<\/code><\/pre>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li><strong>Activate the Virtual Environment<\/strong>:<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>On Windows:<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>.\\venv\\Scripts\\activate<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>This CLI python script is designed to be used by security consultants, IT admins and network engineers to do two things, compare two Nmap XML files to create a spreadsheet that compares IPs, ports and services between the files, and create a markdown report using GPT. Screenshots Features Comprehensive Nmap XML Parsing Comparative Analysis Statistical [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":32122,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20(4).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6321,6052,6325,6574],"class_list":["post-32118","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-nmap-analysis-tool"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nmap Analysis Tool - Enhancing Network Security Through<\/title>\n<meta name=\"description\" content=\"This CLI python script is designed to be used by security consultants, IT admins and network engineers to do two things, compare two Nmap XML\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nmap Analysis Tool - Enhancing Network Security Through\" \/>\n<meta property=\"og:description\" content=\"This CLI python script is designed to be used by security consultants, IT admins and network engineers to do two things, compare two Nmap XML\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-23T07:39:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-23T07:39:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20(4).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20(4).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Nmap Analysis Tool &#8211; Enhancing Network Security Through Advanced Analysis And Reporting\",\"datePublished\":\"2024-02-23T07:39:03+00:00\",\"dateModified\":\"2024-02-23T07:39:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/\"},\"wordCount\":310,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20(4).webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"Nmap Analysis Tool\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/\",\"name\":\"Nmap Analysis Tool - Enhancing Network Security Through\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20(4).webp\",\"datePublished\":\"2024-02-23T07:39:03+00:00\",\"dateModified\":\"2024-02-23T07:39:07+00:00\",\"description\":\"This CLI python script is designed to be used by security consultants, IT admins and network engineers to do two things, compare two Nmap XML\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20(4).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20(4).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nmap Analysis Tool - Enhancing Network Security Through","description":"This CLI python script is designed to be used by security consultants, IT admins and network engineers to do two things, compare two Nmap XML","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/","og_locale":"en_US","og_type":"article","og_title":"Nmap Analysis Tool - Enhancing Network Security Through","og_description":"This CLI python script is designed to be used by security consultants, IT admins and network engineers to do two things, compare two Nmap XML","og_url":"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-02-23T07:39:03+00:00","article_modified_time":"2024-02-23T07:39:07+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20(4).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20(4).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Nmap Analysis Tool &#8211; Enhancing Network Security Through Advanced Analysis And Reporting","datePublished":"2024-02-23T07:39:03+00:00","dateModified":"2024-02-23T07:39:07+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/"},"wordCount":310,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20(4).webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","Nmap Analysis Tool"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/","url":"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/","name":"Nmap Analysis Tool - Enhancing Network Security Through","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20(4).webp","datePublished":"2024-02-23T07:39:03+00:00","dateModified":"2024-02-23T07:39:07+00:00","description":"This CLI python script is designed to be used by security consultants, IT admins and network engineers to do two things, compare two Nmap XML","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/nmap-analysis-tool\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20(4).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20(4).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhYfsA-JabUHC59LKf_vnpSKW8XE4gsadJQEIfBlCi1M0klcK9bdvuEJQSYbImtE7umXUVuSQCMbKcrqQDGktkh1EPpT3ZHG66zyP34yYESpUn9bgyqYN4v7NcpQuhOkUpcrOMEfWfSh0tizJlf-7Dae8B9iP9oIW9CByVpI6P_qdrlzh6Prt5Vk5WfT8xN\/s16000\/Water%20Securing%20System%20Defences%20(4).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":36962,"url":"https:\/\/kalilinuxtutorials.com\/massvulscan\/","url_meta":{"origin":32118,"position":0},"title":"MassVulScan : A Comprehensive Network Scanning Tool","author":"Varshini","date":"March 10, 2025","format":false,"excerpt":"MassVulScan is a powerful network scanning tool designed for pentesters and system administrators to identify open ports and potential security vulnerabilities across large-scale networks. It leverages the capabilities of masscan for rapid port scanning and nmap for detailed service analysis, making it an efficient tool for network security assessments. Key\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MassVulScan-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MassVulScan-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MassVulScan-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MassVulScan-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MassVulScan-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MassVulScan-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":34705,"url":"https:\/\/kalilinuxtutorials.com\/cvescannerv2\/","url_meta":{"origin":32118,"position":1},"title":"CVEScannerV2 &#8211; Enhancing Network Security With Nmap Vulnerability Detection Script","author":"Varshini","date":"September 3, 2024","format":false,"excerpt":"An advanced Nmap script designed to detect potential vulnerabilities in network services. This article delves into the technical specifics, requirements, and operational details of the script, providing a comprehensive guide for enhancing your network's security. Learn how to effectively use CVEScannerV2 to identify vulnerabilities across various services and versions. Nmap\u2026","rel":"","context":"In &quot;Vulnerability Analysis&quot;","block_context":{"text":"Vulnerability Analysis","link":"https:\/\/kalilinuxtutorials.com\/category\/vulnerability-analysis-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEieTxxg2k5CfRQLR6rwvqeWhZWEPmuVou8S0Vg7ZOZo9oWkub3REdu8dmC6ZS3A_IWYAL2xMt0FH9S-oEX-GN-GMLS6l6xEd2DhT9McnsTD8O_r6Alx-MPktj4K4bwTnLpgSEhOLbZ8sfdA_jPN-vNc6xp8FiPln0-xKkHPA1YjI9t5cLYS6tBlL_rAW6Mg\/s16000\/CVEScannerV2%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEieTxxg2k5CfRQLR6rwvqeWhZWEPmuVou8S0Vg7ZOZo9oWkub3REdu8dmC6ZS3A_IWYAL2xMt0FH9S-oEX-GN-GMLS6l6xEd2DhT9McnsTD8O_r6Alx-MPktj4K4bwTnLpgSEhOLbZ8sfdA_jPN-vNc6xp8FiPln0-xKkHPA1YjI9t5cLYS6tBlL_rAW6Mg\/s16000\/CVEScannerV2%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEieTxxg2k5CfRQLR6rwvqeWhZWEPmuVou8S0Vg7ZOZo9oWkub3REdu8dmC6ZS3A_IWYAL2xMt0FH9S-oEX-GN-GMLS6l6xEd2DhT9McnsTD8O_r6Alx-MPktj4K4bwTnLpgSEhOLbZ8sfdA_jPN-vNc6xp8FiPln0-xKkHPA1YjI9t5cLYS6tBlL_rAW6Mg\/s16000\/CVEScannerV2%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEieTxxg2k5CfRQLR6rwvqeWhZWEPmuVou8S0Vg7ZOZo9oWkub3REdu8dmC6ZS3A_IWYAL2xMt0FH9S-oEX-GN-GMLS6l6xEd2DhT9McnsTD8O_r6Alx-MPktj4K4bwTnLpgSEhOLbZ8sfdA_jPN-vNc6xp8FiPln0-xKkHPA1YjI9t5cLYS6tBlL_rAW6Mg\/s16000\/CVEScannerV2%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEieTxxg2k5CfRQLR6rwvqeWhZWEPmuVou8S0Vg7ZOZo9oWkub3REdu8dmC6ZS3A_IWYAL2xMt0FH9S-oEX-GN-GMLS6l6xEd2DhT9McnsTD8O_r6Alx-MPktj4K4bwTnLpgSEhOLbZ8sfdA_jPN-vNc6xp8FiPln0-xKkHPA1YjI9t5cLYS6tBlL_rAW6Mg\/s16000\/CVEScannerV2%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEieTxxg2k5CfRQLR6rwvqeWhZWEPmuVou8S0Vg7ZOZo9oWkub3REdu8dmC6ZS3A_IWYAL2xMt0FH9S-oEX-GN-GMLS6l6xEd2DhT9McnsTD8O_r6Alx-MPktj4K4bwTnLpgSEhOLbZ8sfdA_jPN-vNc6xp8FiPln0-xKkHPA1YjI9t5cLYS6tBlL_rAW6Mg\/s16000\/CVEScannerV2%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":37081,"url":"https:\/\/kalilinuxtutorials.com\/oscp\/","url_meta":{"origin":32118,"position":2},"title":"OSCP : Navigating The Essential Toolkit For Penetration Testing","author":"Varshini","date":"March 14, 2025","format":false,"excerpt":"The OSCP (Offensive Security Certified Professional) certification is a highly respected credential in the cybersecurity industry, focusing on hands-on penetration testing skills. To achieve this certification, candidates must demonstrate proficiency in using various tools and techniques to identify vulnerabilities and exploit them. Here's an overview of some key tools and\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":6093,"url":"https:\/\/kalilinuxtutorials.com\/autorecon-multi-threaded-network-reconnaissance\/","url_meta":{"origin":32118,"position":3},"title":"AutoRecon : Multi Threaded Network Reconnaissance Tool","author":"R K","date":"August 7, 2019","format":false,"excerpt":"AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. It is intended as a time-saving tool for use in CTFs and other penetration testing environments (e.g. OSCP). It may also be useful in real-world engagements. The tool works by firstly performing port scans \/ service detection\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":38125,"url":"https:\/\/kalilinuxtutorials.com\/nmap-cheat-sheet-beginners\/","url_meta":{"origin":32118,"position":4},"title":"Nmap Cheat Sheet for Cybersecurity Professionals","author":"0xSnow","date":"October 8, 2025","format":false,"excerpt":"Nmap is an essential tool for any cybersecurity professional. Whether you're conducting a vulnerability assessment or a penetration test, Nmap allows you to discover hosts, services, and vulnerabilities on a network. Here is a comprehensive list of Nmap commands, organized by functionality, and a stylish HTML table to help you\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"Nmap Cheat Sheet","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgYgGv_GS6gsfx1J7FJ8Xg4ZroURdGNbo1Z9D6_TR4zZWw0YtuCgn5xdEidRTodReJ4oNL2XdeHo63TqZMO1LLC79r7gW7cLsvFgR8TZAUgd6b_ZkVaQ1trXK9UO448J_VNhfapTYr_bJ4_60WDhL8L3PBWKbpADHBJS0pSbMOMpozIrvgd96QfXce248g\/s700\/nmap.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgYgGv_GS6gsfx1J7FJ8Xg4ZroURdGNbo1Z9D6_TR4zZWw0YtuCgn5xdEidRTodReJ4oNL2XdeHo63TqZMO1LLC79r7gW7cLsvFgR8TZAUgd6b_ZkVaQ1trXK9UO448J_VNhfapTYr_bJ4_60WDhL8L3PBWKbpADHBJS0pSbMOMpozIrvgd96QfXce248g\/s700\/nmap.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgYgGv_GS6gsfx1J7FJ8Xg4ZroURdGNbo1Z9D6_TR4zZWw0YtuCgn5xdEidRTodReJ4oNL2XdeHo63TqZMO1LLC79r7gW7cLsvFgR8TZAUgd6b_ZkVaQ1trXK9UO448J_VNhfapTYr_bJ4_60WDhL8L3PBWKbpADHBJS0pSbMOMpozIrvgd96QfXce248g\/s700\/nmap.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgYgGv_GS6gsfx1J7FJ8Xg4ZroURdGNbo1Z9D6_TR4zZWw0YtuCgn5xdEidRTodReJ4oNL2XdeHo63TqZMO1LLC79r7gW7cLsvFgR8TZAUgd6b_ZkVaQ1trXK9UO448J_VNhfapTYr_bJ4_60WDhL8L3PBWKbpADHBJS0pSbMOMpozIrvgd96QfXce248g\/s700\/nmap.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":31459,"url":"https:\/\/kalilinuxtutorials.com\/drawnmap\/","url_meta":{"origin":32118,"position":5},"title":"DrawNmap: Revolutionizing Network Analysis with Python-Based Visualization of Nmap Scan Results","author":"Varshini","date":"December 5, 2023","format":false,"excerpt":"Herramienta desarrollada en Python para mostrar en un diagrama de red el contenido de un escaneo Nmap en formato XML. Los nodos representan cada uno de los activos escaneados en al red con sus puertos abiertos correspondientes. El filtrado de puertos permite mostrar en el gr\u00e1fico \u00fanicamente los dispositivos que\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=32118"}],"version-history":[{"count":2,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32118\/revisions"}],"predecessor-version":[{"id":32121,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32118\/revisions\/32121"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/32122"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=32118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=32118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=32118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}