Dark Mode
Capec-580 Detail
System Footprinting
Standard Software Likelihood: Low Typical Severity: Low
Parents: 169
Children: 85 581
Threats: T60 T65 T80 T258 T288 T291 T302 T334 T392 T407
An adversary engages in active probing and exploration activities to determine security information about a remote target system. Often times adversaries will rely on remote applications that can be probed for system configurations.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-580 | capec | https://capec.mitre.org/data/definitions/580.html | |
| CWE-204 | cwe | http://cwe.mitre.org/data/definitions/204.html | |
| CWE-205 | cwe | http://cwe.mitre.org/data/definitions/205.html | |
| CWE-208 | cwe | http://cwe.mitre.org/data/definitions/208.html | |
| T1082 | ATTACK | https://attack.mitre.org/wiki/Technique/T1082 | System Information Discovery |
Not present
- The adversary must have logical access to the target network and system.
Not present
| Low |
|---|
| The adversary needs to know basic linux commands. |
| Confidentiality |
|---|
| Read Data |
Not present