Using Netcat to control remote hosts!
Understanding how the nmap tool can be used in a Penetration Test