Locate a Port Scanning Tool
List the tool's name.
List the pros and cons associated with the tool you found.
Locate an incident in which the tool was used to exploit an organization.
List the URL and describe the exploit.
Provide the outcome, was the exploit successful or foiled.
Required:
The initial post should be a minimum of 250 words.
Use of significant detail (utilizing textbook, web, etc. for sources) and appropriate grammar.
Also, remember to include (if applicable) supporting references in APA format and citations from those references within the body of your discussions, properly formatted using APA style.