Step 2 - Target Scanning
This step involves the hacker identifying available Routes of attack. This could be either a virtual (external) attack or a physical (internal) attack if access to the premises could be gained. Virtual routes of attack can be pinpointed using widely available software.
Examples of a Virtual Attack
Steve Mac Media Limited - 7592963
Trading Address: Marne House, 24 Mount Ephraim Road, Tunbridge Wells, Kent TN1 1ED
Registered Office: 90-92 King Street, Maidstone, Kent, ME14 1BH