In this section, I'll discuss scanning techniques used by hackers/InfoSec professionals, demonstrate in labs about tools used for scanning.