- How do I run a scan with potentially dangerous test?
- What is potentially dangerous test?
- How do I run a network scan targeting specific vulnerabilities?
- What services does the network scanner try to brute force?
- What type of devices are scanned?
- What are the general basics for how a network scan is performed?