Watch this video on YouTube
What is a passive method used by intruders to identify potential network vulnerabilities?