Methods of attack:
1. scanning may include us≠ >&ing search (google) as well as m•¥'ore traditional methods (nmap)
2. social engineering
3. shooting yourself in the foot
One methodology of the attackers
1. surveillance
2. finding ip dst addresses
3. find KNOWN bugs (known to them)
4. exploitation post break-in
5. hiding their tracks post Or pre bre$σak-in
Implement attack
1. backdoor
2. social engineering attack→₽ ε
3. buffer overflow
4. dictionary attack
5. oh wait, we have the Morris wormφ'• for those terms
6. password attacks
7. fanout attacks included
8. VAX buffer attack code