In this chapter, we will cover the following recipes: Understanding Nmap outputs Understanding Nessus outputs How to confirm Nessus vulnerabilities using Nmap and other tools