```
Detecting attacks is a kind of probing attack conducted by hackers when faced with a target of unknown specific information.
After decoupling and handling the feedback data, a hacker can determine what kind of firewall system is installed on the target network and figure out which operations this firewall system permits.
Armed with his newly "refined" server and the Trojan backdoor shared by Zero, Xiang Shan launched a probing attack on the satellite station's internal network.
And now, he had obtained the feedback data.
However, this era is different from the past.
In this age, firewalls are not "company products." Many firewalls are more like the "artistic creations" of individuals.
To deduce the specifics of a firewall based on the data takes a little time.
This probing attack was merely a preparation for future actions.
If the External Martial Arts emphasize the ability to cope with sudden events, then masters of the Internal would never engage in unprepared combat.