Perform a traceroute on the target.
A port of syn scanner to find quickly open ports on a single target.
Search for vulnerabilities
Search for vulnerabilities known to target services on the national vulnerability database.
Capture passwords of many protocols such as http, ftp, imap, imaps, irc, msn, etc. of the objective.
Listen to cookies on the net and hijack sessions.
Kill the prevention objective to get to any website or server connections.