In this chapter, we will cover the following recipes:
- How to specify a target
- How to perform host discovery
- How to identify open ports
- How to manage specification and scan order
- How to perform script and version scan
- How to detect operating system
- How to detect and bypass network protection systems
- How to use Zenmap