After taking inventory of the network, the data collection phase begins. The scanner contacts each node to gather additional information. The scanning host will attempt to connect to the different nodes and gather what information it can from the responses. This information is stored to be used for further analysis in the next phase. The scanner can be configured to collect data on every port, a limited number of ports, or to only look for the most common vulnerabilities. |