The following is a list of guidelines for performing network scanning:
- Perform host discovery on the network.
- Perform port scanning to determine services.
- Perform banner grabbing of target operating systems and ports.
- Perform vulnerability scanning.
- Create a network topology of the target network.
Next, we will learn about the fundamental requirements for an enumeration checklist.