Lecture 9: Vulnerability Scanning