A vulnerability scanning is completed to grasp spots which can be at risk of an attack from the invader in advance of they exploit the system. The above mentioned actions not simply defend knowledge andDestructive actors can utilize vulnerabilities, which are flaws inside the system, and exploits, which can be certain approaches used to acquire una