First page Back Continue Last page Overview Graphics
Precursors
Port Scan: an attacker has found your system and usually begins by trying to map all the open or available services.
- Nmap, netcat and nessus both use this as a basic information tool.
Social Engineering: attackers may begin by avoiding complicated or difficult computing tasks by trying easier social methods.
- “Hello, this is bob down in the IT department...”