Phase 2. Identify Targets and Run Scans Goal: Identify the tools and techniques to be used to perform host discovery and enumeration. Procedure: List out the tools you plan on using to perform network scans, the purpose for using them, and how you will use them. For example: 1. Tool: Nmap. Purpose: Obtain information on hosts and the services and operating systems they are running. Commands: Deliverable: Provide a minimum 2-page description of the tools you plan on using for the network scans, your reasoning for selecting them, and how they will be used. Be sure to include any challenges and potential drawbacks or Network scanning will be performed by utilizing the following 5 tools - Nmap: Offer comprehensive network scanning capabilities. -Masscan: Ideal for swift scans across large networks. -Wireshark: Essential for detailed packet-level analysis. -Nikto: Specialized in web server vulnerability identification -Nessus/OpenVAS: Provides through vulnerability assessment..