... discover the method and motives of the attacker. Since the attacker believes that they are attacking a production system, they will open up their bag of tricks and reveal their intentions be they ... Want Othersto run Them• Remember port 365?• Name servers, mail servers, and web servers draw the most fire on the Internet. What if they had their non-service ports instrumented?• The end ... attacker will then complete the connection and begin the attack, which can be recorded. That is the end of the show however - at this point the firewall aborts the connection. However, I have managed...