- Objective is to look for Live Hosts on the target network so that services and vulnerabilities may be enumerated later
- To determine the perimeter of the target network /system
- To facilitate network mapping
- To build an inventory of accessible systems on target network
- Can be intrusive, may be setected by IDS
Tools
No comments:
Post a Comment