First page
Back
Continue
Last page
Summary
Graphic
Targeting
Banner analysis
Host (login)
Service (smtp, pop, http)
Port correlation
Identify potential vulnerabilities