CAPEC-300: Port Scanning
An adversary uses a combination of techniques to determine the state of the ports on a remote target. Any service or application available for TCP or UDP networking will have a port open for communications over the network.
Severity
Low
14
/ 100
low-risk
Active Threat
12/50 · Low
Exploit Availability
2/50 · Minimal