Traceroute nodes will be drawn connected to the Access Point. Cookies will have lines
connected to the host from which it is grabbed.
If the user clicks a traceroute node, DroidGlance will show the detailed data about the
traceroute node. If the user clicks a Cookie node, he/she can open the website using the
cookie. If the user clicks a connected host node, the detailed data will be shown and he/she
can choose to perform Port Scanner feature.
Port Scanner is described in Figure 6. DroidGlance will scan the host using Nmap
command from Nmap v6.51. Open port number then will be passed to be queried in National
Institute of Standards and Technology's National Vulnerability Database (NVD) [] to obtain
the vulnerabilities data related to the port. However, the data passed to the website hasn’t
included the service version running on the port. The web page result will be parsed and
saved so if next scanning results in same port number, the querying process can be skipped
and vulnerability data can be directly shown to the user.
Scanning result can be generated into a PDF report. This is described in Figure 7. If a user
chooses to save the report, DroidGlance will generate a PDF report and an object report.
DroidGlance uses iTextG v5.4.4 as an additional library to generate the report. The object
Traceroute nodes will be drawn connected to the Access Point. Cookies will have linesconnected to the host from which it is grabbed.If the user clicks a traceroute node, DroidGlance will show the detailed data about thetraceroute node. If the user clicks a Cookie node, he/she can open the website using thecookie. If the user clicks a connected host node, the detailed data will be shown and he/shecan choose to perform Port Scanner feature.Port Scanner is described in Figure 6. DroidGlance will scan the host using Nmapcommand from Nmap v6.51. Open port number then will be passed to be queried in NationalInstitute of Standards and Technology's National Vulnerability Database (NVD) [] to obtainthe vulnerabilities data related to the port. However, the data passed to the website hasn’tincluded the service version running on the port. The web page result will be parsed andsaved so if next scanning results in same port number, the querying process can be skippedand vulnerability data can be directly shown to the user.Scanning result can be generated into a PDF report. This is described in Figure 7. If a userchooses to save the report, DroidGlance will generate a PDF report and an object report.DroidGlance uses iTextG v5.4.4 as an additional library to generate the report. The object
การแปล กรุณารอสักครู่..