Bounty Hacker — Network Scan Firstly, we will use a program called nmap to gather as much information as we can about the target system, to find out what open ports on the network and what is running on those ports. The command I use for nmap scan: nmap -A…