An attacker has a wide variety of tools available to them when probing your site for vulnerabilities. Let's look at some of the ways you might be leaking information.