What does a Hacker Do? - Phase 2: Scanning