Implementing Vulnerability Scanning Methods