First page
Back
Continue
Last page
Summary
Graphics
Now, where can I go?
Once inside, the attacker can get almost any information they want
Packet sniffers
On-line network maps and management tools
More probing to find new systems