|
|
|
- PING
is a popular tool used to verify that a host is alive; it allows a hacker to start mapping a network.
- Web sites such as www.arin.net provide personal information about the owners of a network address.
- Port Scans tell the attacker what services are running on the remote host, revealing its operating system and exposing vulnerabilities.
- Packet sniffers analyze packets to discover their origins, destination address, and type of data.
- The telephone is commonly used to gain trust and extract valuable information.
|