CAPEC 580 System Footprinting

Stable Standard Low Risk
Severity Low

Description

An adversary engages in active probing and exploration activities to determine security information about a remote target system. Often times adversaries will rely on remote applications that can be probed for system configurations.

Mitigations

2

Consequences

Relationships

Related ATT&CK Techniques

1