Vulnerability scanner

Download and run a vulnerability scanner (your choice) and a port scanner on a machine. Take the top 5 vulnerabilities and research them

Sample Solution