Mapping the OS, Service, device with the Associated Security Vulnerabilities You do not have access to this note. Post navigationPrevious post: Performing Vulnerability Assessment/ScanningNext post: Performing Windows Exploitation