An adversary actively probes the target in a manner that is designed to solicit information that could be leveraged for malicious purposes.
Description
Mitigations
2
Consequences
Relationships
Resources Required
1