when an attacker moves to a new machine and rescans the network to look for machines not previously visible, what is this technique called