Summary
In this chapter, we explored scanning and enumeration by showing how it is done at a basic level, using built-in tools such as Ping and Traceroute. We also introduced you to Nmap, which is the de facto standard tool for scanning. This robust tool can not only map out networks but also identify open ports and services, and it can be extended with its scripting engine to perform highly complex scanning techniques. The best part is that not only is the tool included with every install of Kali; it is also freely available for download for any operating system.
In the next chapter, we are going to dig deeper into scanning by looking at vulnerabilities and vulnerability scanning. Additionally, we will see how network defenders use the retrieved information to assess the vulnerability of an organization. This effort is known as threat modeling or risk assessment.