Once armed for attack, intruders look for holes in the operating system or services that are running.