Scanning Steps:

1- Network Sweeping

2- Network tracing

3- Port Scanning

4- OS Fingerprinting

5- Version Scanning

6 - Vulnerability Scanning


USEFUL TIPS