CAPEC-300: Port Scanning

An adversary uses a combination of techniques to determine the state of the ports on a remote target. Any service or application available for TCP or UDP networking will have a port open for communications over the network.

Severity
Low
14
/ 100
low-risk
Active Threat 12/50 · Low
Exploit Availability 2/50 · Minimal