How to do Reconnaisance and Vulnerability Scan Using Red Hawk