System information collection for hacking purposes or system penetration testing. A hacker uses system information to gain unauthorized access to protected digital or electronic materials, and may go around routers or even firewalls to get it. Can be used by systems analysts and programmers to test the security of networks and systems and scan for potential vulnerabilities. -techopedia.com