Complete a port scan. Use NMAP for this. Showcase the findings.Use Hping3 to perform network reconnaissance. Showcase the findings.Use Kali tools to perform perform a TCP Food attack with Hping3. Wireshark should monitor this so you can record your findings.Write a 2 page paper that discusses your findings and what businesses should do to mitigate these attack vectors.