Previous Lecture Complete and continue  

  1.15 Reconnaissance Techniques Using Vulnerability Scanners