The gathering of information about specific devices such as IP addresses, ports, applications, versions, OS, and vulnerabilities.
Scanning is an extension of reconnaissance in the Cyber Kill Chain. Once attackers have identified and researched their targets, the next step is to find weaknesses in the target’s defenses.
Scanning gathers technical information about the target. Attackers can scan for vulnerable ports, Applications have a lot of functionality, and more functionality means less security. Knowing which application the target is running creates opportunities of attack through the software.