Mal4s could likely be used with a minute or hours worth of data to illuminate clients of a service which are engaged in working through an alphabetical list.
Examples include brute force attacks, database extraction through repeated queries, DNS queries, whois queries, mail delivery, testing of purchased lists of PII.
Number sequence attack examples include those related to payment methods, also delivery of ICQ messages in bulk and SMS messages.
While any sophisticated attacker should randomize their queries, it is not convenient and they may assume no one is checking. Also there are many unsophisticated attackers.
Mal4s could likely be used with a minute or hours worth of data to illuminate clients of a service which are engaged in working through an alphabetical list.
Examples include brute force attacks, database extraction through repeated queries, DNS queries, whois queries, mail delivery, testing of purchased lists of PII.
Number sequence attack examples include those related to payment methods, also delivery of ICQ messages in bulk and SMS messages.
While any sophisticated attacker should randomize their queries, it is not convenient and they may assume no one is checking. Also there are many unsophisticated attackers.