Hackers usually gather information about the firewall by direct port scanning. By analyzing which ports respond to the port scan, the hacker can identify most firewalls. This method, however, creates a "noise" that can be monitored in the log entries to the firewall. |