CAPEC 301 TCP Connect Scan

Stable Detailed Unknown Risk
Severity Low

Description

An adversary uses full TCP connection attempts to determine if a port is open on the target system. The scanning process involves completing a 'three-way handshake' with a remote port, and reports the port as closed if the full handshake cannot be established. An advantage of TCP connect scanning is that it works against any TCP/IP stack.

Attack Execution Flow

2

Mitigations

1

Consequences

Relationships

Resources Required

1