Unobtrusive Mapping of Network
Purpose of Scanning the Network: Stealth Attacks
Packet Sniffing Attack & Vulnerable Ethernet Communications – II