Table of Contents
Reconnaissance Attacks
1: Discovery and mapping of systems to gather information.
2: Intruders look for vulnerable services.
3: Investigate the neighbourhood.
1: Discovery and mapping of systems to gather information.
2: Intruders look for vulnerable services.
3: Investigate the neighbourhood.