Which is the first step followed by Vulnerability Scanners for scanning a network?