CAPEC 300 Port Scanning

Stable Standard Unknown Risk
Severity Low

Description

An adversary uses a combination of techniques to determine the state of the ports on a remote target. Any service or application available for TCP or UDP networking will have a port open for communications over the network.

Consequences

Relationships

Related ATT&CK Techniques

1

Resources Required

1