Once armed for attack, intruders look for holes in the operating system or services that are running.

  • Sendmail and print server may allow hackers privileged access.
  • TFTP and guest accounts with easy passwords are common targets.