There are many ways a hacker can find your network devices and gather information about them so that they can be compromised or circumvented.