Network Security Comprehensive Experiment 2 Scan or invade the target computer to obtain information