Fluxo de Execução
1) Experiment
An adversary attempts to initialize a TCP connection with with the target port.
2) Experiment
An adversary uses the result of their TCP connection to determine the state of the target port. A successful connection indicates a port is open with a service listening on it while a failed connection indicates the port is not open.
Pré-requisitos
The adversary requires logical access to the target network. The TCP connect Scan requires the ability to connect to an available port and complete a 'three-way-handshake' This scanning technique does not require any special privileges in order to perform. This type of scan works against all TCP/IP stack implementations.
Recursos Necessários
The adversary can leverage a network mapper or scanner, or perform this attack via routine socket programming in a scripting language. Packet injection tools are also useful for this purpose. Depending upon the method used it may be necessary to sniff the network to see the response.
Mitigações
Employ a robust network defense posture that includes an IDS/IPS system.
Fraquezas Relacionadas
| CWE-ID |
Nome da Fraqueza |
|
Exposure of Sensitive Information to an Unauthorized Actor The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Referências
REF-33
Hacking Exposed: Network Security Secrets & Solutions
Stuart McClure, Joel Scambray, George Kurtz.
REF-128
RFC793 - Transmission Control Protocol
Defense Advanced Research Projects Agency Information Processing Techniques Office, Information Sciences Institute University of Southern California.
http://www.faqs.org/rfcs/rfc793.html REF-34
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Gordon "Fyodor" Lyon.
REF-130
The Art of Port Scanning
Gordon "Fyodor" Lyon.
http://phrack.org/issues/51/11.html
Submissão
| Nome |
Organização |
Data |
Data de lançamento |
| CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modificações
| Nome |
Organização |
Data |
Comentário |
| CAPEC Content Team |
The MITRE Corporation |
2018-07-31 +00:00 |
Updated Attack_Prerequisites, Description, Description Summary, References, Related_Weaknesses, Resources_Required, Solutions_and_Mitigations |
| CAPEC Content Team |
The MITRE Corporation |
2020-12-17 +00:00 |
Updated Execution_Flow |
| CAPEC Content Team |
The MITRE Corporation |
2022-02-22 +00:00 |
Updated Description, Extended_Description |