Dark Mode

Settings

Capec-580 Detail

System Footprinting

Standard Software Likelihood: Low Typical Severity: Low

Parents: 169

Children: 85 581

Threats: T60 T65 T80 T258 T288 T291 T302 T334 T392 T407

Description

An adversary engages in active probing and exploration activities to determine security information about a remote target system. Often times adversaries will rely on remote applications that can be probed for system configurations.

Not present

Not present

  1. The adversary must have logical access to the target network and system.

Not present

Low
The adversary needs to know basic linux commands.
Confidentiality
Read Data

Not present