Select one network scanning software tool (there is a list in your required reading slides) and explain in detail how it works and how detects network vulnerabilities.