14.1. Collecting Information

Woolly Attacker has seen one of your TV ads and decided that your political views do not match his own. He decides his best recourse is to attack your network. The question is, where to begin? At this point, Woolly does not even know your domain name. In order to attack your network, he has to do some investigative work.

NOTE

The attack techniques described here assume a cracker is attempting to penetrate a specific network. In reality, most hackers indiscriminately attack any systems that exhibit specific vulnerabilities. With the advent of fast, automated tools (used by "script kiddies," individuals without sophisticated technical knowledge beyond what is needed to employ these tools), crackers can scan entire ...

Get Mastering™ Network Security, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.