Securing Network Infrastructure
上QQ阅读APP看书,第一时间看更新

How it works…

These options help the user to streamline their requirement to identify the live hosts and thus perform further probes. Using these different scan options, a user can target a specific port and protocol to obtain the current status of the host. Most of these options can be further configured with advanced probing techniques, such as arguments for service detection and operating system detection, to obtain further information about these instances.