Vulnerability Assessment
The function of the activity is to search for systems and equipment present on a network or on a system, local or remote, and enumerate the exposed services as well as any installed software.
The presence of vulnerabilities is then checked which, if exploited, could lead to an interruption of service or a data leak.
The activity generally does not cause disruptions to the infrastructures analyzed.