The 'ping' utility in a for loop can effectively sweep the network to discover other machines. By systematically sending ping requests to a range of IP addresses, you can identify which machines are active and responding. This method leverages a tool (ping) that is typically pre-installed on a Windows host and complies with the rule of using only available tools.
The section of a penetration test or ethical hacking engagement final report used to detail and prioritize the results of your testing is the 'Findings' section. This part of the report summarizes the discovered vulnerabilities, their impact, and prioritizes them based on their severity, helping stakeholders understand the critical areas that need immediate attention.