For the sake of this lesson, we will pull legal, available targets from the popular bug bounty program Bugcrowd as well as a testing machine from the Nmap project.

For the following examples, we will be using Fitbit as our target. Specifically, we will be scanning www.fitbit.com
Information on their scope can be found here: https://bugcrowd.com/fitbit

Information on Nmap’s service can be found here: http://scanme.nmap.org/