What Do They Do (1of 3) ?
Scan networks for vulnerable hosts
- open user accounts (e.g., guest account with no password)
- exploitable services (i.e., programs that can be broken to gain access and/or data)
- possible Denial of Service (DoS) candidate to exploit later (i.e., “crash” the computer)
- get password file and crack one or more accounts
- use open account such as guest
- “get in” by exploiting buffer overflow through flaws in some network services (e.g., statd)