Introduction After mapping the network topology successfully, next thing to do for ethical hacker is to detect the possible points from which attack can be deployed on host. For this purpose host scanning is done through various methods discussed below. Social engineering It is one of the largest threat to