Preforming a Vulnerability Assessment on a Secured Network