This is often like reconnaissance, other than you attain information regarding the focus on by interacting with it for the goal of seeking a vulnerability. This is so simple as it gets, but might be incriminating if there is even a slight slip-up. A destructive hacker has to watch out http://pigpgs.com