CAPEC Details
Name Port Scanning
Likelyhood of attack Typical severity
Low Low
Summary An adversary uses a combination of techniques to determine the state of the ports on a remote target. Any service or application available for TCP or UDP networking will have a port open for communications over the network.
Prerequisites The adversary requires logical access to the target's network in order to carry out this type of attack.
Solutions
Related Weaknesses
CWE ID Description
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Related CAPECS
CAPEC ID Description
CAPEC-169 An adversary engages in probing and exploration activities to identify constituents and properties of the target.
Taxonomy: ATTACK
Entry ID Entry Name
1046 Network Service Scanning