You are on page 1of 1

be able to scan multiple subnets

check open ports for vulnerable protocols, ftp, smb etc.


use banner requests to check if it is a vulnerable version of this protocol
Automate vulnerability scanning for printer exploit

You might also like