Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
The next step in planning an attack is to enumerate the various ports, IP addresses, OSes, services, and software versions running within a target's environment. This is performed in order to uncover potential vulnerabilities which can then be exploited. Tools used in this step include NMAP, Armitage, and ZenMap.