Purpose of Scanning the Network: Stealth Attacks
Packet Sniffing Attack & Vulnerable Ethernet Communications – II