Methods of attack:
1. scanning may include using search (google) as well as more traditional methods (nmap)
2. social engineering
3. shooting yourself in the foot
One methodology of the attackers
1. surveillance
2. finding ip dst addresses
3. find KNOWN bugs (known to them)
4. exploitation post break-in
5. hiding their tracks post Or pre break-in
Implement attack
1. backdoor
2. social engineering attack
3. buffer overflow
4. dictionary attack
5. oh wait, we have the Morris worm for those terms
6. password attacks
7. fanout attacks included
8. VAX buffer attack code