Techniques that allow an attacker to gain knowledge about a system and its network environment
Last updated 7 months ago