CAPEC-300 Port Scanning

CAPEC ID: 300

CAPEC-300 Metadata

Likelihood of Attack

Low

Typical Severity

Low

Overview

Summary

An adversary uses a combination of techniques to determine the state of the ports on a remote target. Any service or application available for TCP or UDP networking will have a port open for communications over the network.

Prerequisites

The adversary requires logical access to the target's network in order to carry out this type of attack.

Potential Solutions / Mitigations

No specific solutions listed.

Related Weaknesses (CWE)

CWE ID Description
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Related CAPECs

CAPEC ID Description
CAPEC-169 An adversary engages in probing and exploration activities to identify constituents and properties of the target.

Taxonomy Mappings

Taxonomy: ATTACK

Entry ID Entry Name
1046 Network Service Scanning

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.