An adversary uses a combination of techniques to determine the state of the ports on a remote target. Any service or application available for TCP or UDP networking will have a port open for communications over the network.
Description
Consequences
Relationships
Related ATT&CK Techniques
1
Resources Required
1