CAPEC-307 Metadata
Likelihood of Attack
Low
Typical Severity
Low
Overview
Summary
An adversary scans for RPC services listing on a Unix/Linux host.
Prerequisites
RPC scanning requires no special privileges when it is performed via a native system utility.
Execution Flow
Step | Phase | Description | Techniques |
---|---|---|---|
1 | Experiment | An adversary sends RCP packets to target ports. |
|
2 | Experiment | An adversary uses the response from the target to determine which, if any, RPC service is running on that port. Responses will vary based on which RPC service is running. |
|
Potential Solutions / Mitigations
Typically, an IDS/IPS system is very effective against this type of attack.
Related Weaknesses (CWE)
CWE ID | Description |
---|---|
CWE-200 | Exposure of Sensitive Information to an Unauthorized Actor |
Related CAPECs
CAPEC ID | Description |
---|---|
CAPEC-300 | An adversary uses a combination of techniques to determine the state of the ports on a remote target. Any service or application available for TCP or UDP networking will have a port open for communications over the network. |
Stay Ahead of Attack Patterns
Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.