Wacky: There are two phases to an attack on a publicly accessible system:-

1. The Footprinting Phase: This is the act of determining the structure and available access to a network and what the...