
Introduction
The initial phase of an external blind security assessment involves finding targets
to assess. Beyond simply locating targets, any good auditor (or attacker) knows
that the easiest targets are those lost, forgotten machines that lie “off the radar” of
the IT security team. In this ...