Part 2. Researching Security Audit Tools
In Part 2 of this lab, you research network security audit tools and attacker tools and investigate one that can be used to identify host or network device vulnerabilities. Fill in the report below based on your findings.
Step 1: Research various security audit and network attack tools.
List some of the tools that you identified in your search.