
42
Chapter 2: A Threat Model for MPLS VPNs
Reconnaissance Attacks
To effectively launch certain types of attacks, a hacker usually needs some knowledge about
the network topology or hardware used. The technique that gathers this type of information
is called
reconnaissance
. Reconnaissance on its own is, in many environments, not a threat,
but the intelligence found by employing it is often used later to attack a system or network.
So, the threat of reconnaissance attacks is mostly an indirect one: after the network has been
scanned, this information is used subsequently for attacks.
NOTE
Often reconnaissance attacks go undetected for considerable ...