How hackers use port scanning and why?