Attacks Requiring Protection
Scanning Attacks
- To identify victims and ways of attacking them
- Attacker sends messages to select victims and attack methods
- Examines data that responses reveal
- IP addresses of potential victims
- What services victims are running; different services have different weaknesses
- Host’s operating system, version number, etc.