Intermediate

12345
Across
  1. 2. A tool used for scanning and monitoring packets.
  2. 4. ______________ is the first phase of ethical hacking.
  3. 5. Packet filtering firewalls work effectively in _________ networks.
Down
  1. 1. Bug bounty hunters try to find bugs on ________.
  2. 3. Network enumeration is the finding of __________ or devices on a network.