
At 05:30 AM, she emailed the draft report to her senior analyst. Subject: Vulnerability Analysis Complete – Bank Client – Critical Finding Attached.
Following Lisa’s methodology, Maya began with the discovery phase. She launched Nmap, scanning the bank’s IP range. Ports 80 and 443 blinked open—standard web traffic. Then port 3389: Remote Desktop Protocol. That was a risk. Port 22: SSH, which was fine, but its version banner was old. ethical hacking: vulnerability analysis lisa bock videos
That wasn’t a flaw. That was a pattern of neglect. At 05:30 AM, she emailed the draft report