A "mandatory" step to achieve a complete and successful targeted attack is the so called: "Cyber Intelligence Phase". By definition every targeted attack owns at least one specific characteristic which makes it perfectly fit for a given target. As you may agree, one of the most important activities on developing a targeted attack is to exactly know what's running on the target system. The activity which takes care of "discovering" what's running on a given system is often called Cyber Intelligence (many of you in the Cyber Intelligence field might know another definition... but that's not the point). I wont write, in this quick and dirty blog post, about cyber intelligence, however I want to point out simple techniques to perform a target enumeration by using Internet Explorer.
more here.................http://marcoramilli.blogspot.com/2014/07/cyber-intelligence-abusing-internet.html
more here.................http://marcoramilli.blogspot.com/2014/07/cyber-intelligence-abusing-internet.html