14.1. Collecting Information
Woolly Attacker has seen one of your TV ads and decided that your political views do not match his own. He decides his best recourse is to attack your network. The question is, where to begin? At this point, Woolly does not even know your domain name. In order to attack your network, he has to do some investigative work.
The attack techniques described here assume a cracker is attempting to penetrate a specific network. In reality, most hackers indiscriminately attack any systems that exhibit specific vulnerabilities. With the advent of fast, automated tools (used by "script kiddies," individuals without sophisticated technical knowledge beyond what is needed to employ these tools), crackers can scan entire ...