4 min readVULNERABILITY SCANNINGVulnerability Scanning, Part 1: NexposeWelcome back, my aspiring cyberwarriors! One of the keys to being successful as a hacker, pentester, or cyber warrior is the ability to...