Published by:
|

A tool used in the reconnaissance stage of an attack. The attacker scans an IP to discover if any vulnerable ports are open that are more prone to exploitation. 

Share this post

Related Posts

Get in touch

SPEAK WITH AN EXPERT

01423 425 498

Related Posts