The Information Gathering exploits collect information, such as user account names, which attacker would gather prior to mounting a concerted attack.