CAPEC-300 Metadata
Likelihood of Attack
Low
Typical Severity
Low
Overview
Summary
An adversary uses a combination of techniques to determine the state of the ports on a remote target. Any service or application available for TCP or UDP networking will have a port open for communications over the network.
Prerequisites
The adversary requires logical access to the target's network in order to carry out this type of attack.
Potential Solutions / Mitigations
No specific solutions listed.
Related Weaknesses (CWE)
CWE ID | Description |
---|---|
CWE-200 | Exposure of Sensitive Information to an Unauthorized Actor |
Related CAPECs
CAPEC ID | Description |
---|---|
CAPEC-169 | An adversary engages in probing and exploration activities to identify constituents and properties of the target. |
Taxonomy Mappings
Taxonomy: ATTACK
Entry ID | Entry Name |
---|---|
1046 | Network Service Scanning |
Stay Ahead of Attack Patterns
Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.