An adversary sends SYN packets to ports they want to scan and checks the response without completing the TCP handshake.
An adversary uses the response from the target to determine the port's state. The adversary can determine the state of a port based on the following responses. When a SYN is sent to an open port and unfiltered port, a SYN/ACK will be generated. When a SYN packet is sent to a closed port a RST is generated, indicating the port is closed. When SYN scanning to a particular port generates no response, or when the request triggers ICMP Type 3 unreachable errors, the port is filtered.
Weakness Name | |
---|---|
CWE-200 |
Exposure of Sensitive Information to an Unauthorized Actor The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Name | Organization | Date | Date release |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation |
Name | Organization | Date | Comment |
---|---|---|---|
CAPEC Content Team | The MITRE Corporation | Updated Attack_Motivation-Consequences, Description, Description Summary, References, Related_Weaknesses, Resources_Required | |
CAPEC Content Team | The MITRE Corporation | Updated Description, Execution_Flow | |
CAPEC Content Team | The MITRE Corporation | Updated Description, Extended_Description |