Ethical Hacking (part 2.0/20): Network scanning in depth with examples and tools

Maciej Zalwert
10 min readJun 1, 2021

Note: This article is being updated regularly. The latest update is as of 01/06/2021

Note: The main purpose of this series of articles is to introduce how cyber criminals work from the inside. Being aware of their tools and methods may help you prevent cyber attacks on your personal or business resources.

--

--

Maciej Zalwert

Data Scientist with 5+ years of broad-based experience in building data-intensive solutions for diverse industries