- Network Scanning Cookbook
- Sairam Jetty
- 21字
- 2021-08-13 15:14:18
Flow of procedures
The activity of a Network Vulnerability Scan can be divided into three phases:
- Discovery
- Port scanning
- Vulnerability scanning
The activity of a Network Vulnerability Scan can be divided into three phases: