Objectives of network scanning Finding the live hosts in a network SNMP Enumeration SMTP Enumeration DNS Enumeration Finding open ports on a server Finding the services on a server Os fingerprinting Server Banner grabbing tools What is a Vulnerability Scanning What is a proxy server How does proxy server work Why do hackers use proxy servers What is a TOR network Why hackers prefer to use TOR networks What is a web server Different webserver applications in use Why are web-servers hacked & its consequences Directory traversal attacks Website defacement Website password brute forcing