Techniques that allow an attacker to gain knowledge about a system and its network environment
Last updated 4 months ago