Figure 12.5
Scanning the internal network using Nessus