: Use Nmap to identify active hosts, open ports, and running services.

: Are you testing for vulnerabilities, system misconfigurations, or specific password weaknesses? 2. Reconnaissance & Information Gathering

: Never test a system you do not have written permission to scan.