1. What Scanners Actually Do
$ core idea: Vulnerability scanners probe exposed services, inspect protocol banners, test known behavior patterns, and — in credentialed mode — query the host directly for installed packages, versions, patch state, and configuration settings. They estimate risk based on what they can observe, but they do not replace analyst context and architecture knowledge.
$ defender angle: Scanner output always includes false positives, duplicate findings, and technically valid findings that are operationally low risk because of segmentation, disabled code paths, or compensating controls. Reading scanner output without architecture knowledge produces misleading prioritization.
$ prove understanding: Explain the purpose and limitations of unauthenticated scans.