Traceroute nodes will be drawn connected to the Access Point. Cookies will have lines connected to the host from which it is grabbed.If the user clicks a traceroute node, DroidGlance will show the detailed data about the traceroute node. If the user clicks a Cookie node, he/she can open the website using the cookie. If the user clicks a connected host node, the detailed data will be shown and he/she can choose to perform Port Scanner feature.Port Scanner is described in Figure 6. DroidGlance will scan the host using Nmap command from Nmap v6.51. Open port number then will be passed to be queried in National Institute of Standards and Technology's National Vulnerability Database (NVD) [] to obtain the vulnerabilities data related to the port. However, the data passed to the website hasn’t included the service version running on the port. The web page result will be parsed and saved so if next scanning results in same port number, the querying process can be skipped and vulnerability data can be directly shown to the user.Scanning result can be generated into a PDF report. This is described in Figure 7. If a user chooses to save the report, DroidGlance will generate a PDF report and an object report.DroidGlance uses iTextG v5.4.4 as an additional library to generate the report. The object