Scan the nearby IP addresses, MAC addresses, hostnames, etc.
Finds applications currently hijacked or susceptible of being hijacked.
Detects and gives information about wireless networks.