| Name |
Port Scanning |
|
| Likelyhood of attack |
Typical severity |
| Low |
Low |
|
| Summary |
An adversary uses a combination of techniques to determine the state of the ports on a remote target. Any service or application available for TCP or UDP networking will have a port open for communications over the network. |
| Prerequisites |
The adversary requires logical access to the target's network in order to carry out this type of attack. |
| Solutions | |
| Related Weaknesses |
|
CWE ID
|
Description
|
| CWE-200 |
Exposure of Sensitive Information to an Unauthorized Actor |
|
| Related CAPECS |
|
CAPEC ID
|
Description
|
| CAPEC-169 |
An adversary engages in probing and exploration activities to identify constituents and properties of the target. |
|
| Taxonomy: ATTACK |
|
Entry ID
|
Entry Name
|
| 1046 |
Network Service Scanning |
|