carri5360 carri5360 19-12-2022 Computers and Technology contestada in which phase of the attack methodology do we correlate open ports and running services to a potential attack vector?