You could fill a book on this topic. A good place to start is Network Intrusion Detection: An Analyst's Handbook, published by New Riders Publishing. A free sample chapter on Intelligence Gathering Techniques can be found at http://www.microsoft.com/technet/security/topics/network/intel.mspx.
Related Q&A from Bernie Klinder
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.