... ind out whether his host had certain services available or not, services that he would legitimately use. So how do we find out? In this case it is easy. Let's read his Phrack articles! [http://phrack.org/issues.html?issue=51&id=11#article] His first one, in Phrack 51, states: "These ports represent potential communication channels. Mapping their existence facilitates the exchange of information with the host, and thus it is quite useful for anyone wishing to explore their network ...