The attacker can then proceed to exploit any vulnerabilities by targeting active services. A port scanner is a piece of software designed to search a network host for open ports. Ping sweeps and port scans are two primary reconnaissance techniques used to discover hosts and services that can be exploited.