Scanning for Devices, Systems, or Routes |
Attack Pattern ID: 309 (Meta Attack Pattern) | Typical Severity: Low | Status: Draft |
Summary
An attacker engages in scanning activity to find vulnerable network nodes, such as hosts, devices, or routes. Attackers usually perform this type of network reconnaissance during the early stages of attack against an external network. Many types of scanning utilities are typically employed, including ICMP tools, network mappers, port scanners, and route testing utilities such as traceroute.
Target Attack Surface Description
Targeted OSI Layers: Network Layer Transport Layer Application Layer
Target Attack Surface Localities
Target Attack Surface Types: Host Service
Target Functional Services
Target Functional Service 1: None | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
Protocol 1: Any | ||||||||||||
|
Probing requires the ability to interactively send and receive data from a target, whereas passive listening requires a sufficient understanding of the protocol to analyze a preexisting channel of communication.
Nature | Type | ID | Name | Description | View(s) this relationship pertains to![]() |
---|---|---|---|---|---|
ChildOf | ![]() | 289 | Infrastructure-based footprinting | Mechanism of Attack (primary)1000 | |
ParentOf | ![]() | 290 | Enumerate Mail Exchange (MX) Records | Mechanism of Attack1000 | |
ParentOf | ![]() | 291 | DNS Zone Transfers | Mechanism of Attack1000 | |
ParentOf | ![]() | 292 | Host Discovery | Mechanism of Attack1000 | |
ParentOf | ![]() | 293 | Traceroute Route Enumeration | Mechanism of Attack1000 |