Common Information
Type Value
Value
Vulnerability Scanning - T1595.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may scan victims for vulnerabilities that can be used during targeting. Vulnerability scans typically check if the configuration of a target host/application (ex: software and version) potentially aligns with the target of a specific exploit the adversary may seek to use. These scans may also include more broad attempts to [Gather Victim Host Information](https://attack.mitre.org/techniques/T1592) that can be used to identify more commonly known, exploitable vulnerabilities. Vulnerability scans typically harvest running software and version numbers via server banners, listening ports, or other network artifacts.(Citation: OWASP Vuln Scanning) Information from these scans may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190)).
Details Published Attributes CTI Title
Details Website 2024-11-16 90 From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-16 4 External Pentest Command Checklist/Cheat sheet (Windows)
Details Website 2024-11-16 1 Solid Security Pro Review
Details Website 2024-11-16 0 Solid Security Pro Review
Details Website 2024-11-16 0 Solid Security Pro Review
Details Website 2024-11-16 1 The Ultimate Cybersecurity Study Guide: Your Roadmap to Mastery
Details Website 2024-11-16 0 Web Security Automation: Your Shield Against Cyber Threats
Details Website 2024-11-16 0 Understanding Hacking, Virtual Machines, Linux, and Networking: A Comprehensive Guide
Details Website 2024-11-16 1 Solid Security Pro Review
Details Website 2024-11-15 0 Is your cybersecurity really covering all the bases?  | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-15 0 Solid Security Pro existing site review
Details Website 2024-11-15 1 Solid Security Pro Review
Details Website 2024-11-15 5 How Runtime Insights Help with Container Security
Details Website 2024-11-15 1 Solid Security Pro Review
Details Website 2024-11-15 38 Dark Web Profile: Cadet Blizzard
Details Website 2024-11-15 12 Ivanti Cloud Services Appliance Hacked! | CVE-20248963 | Live Bug
Details Website 2024-11-15 1 Solid Security Pro Review
Details Website 2024-11-15 1 Solid Security Pro Overview review
Details Website 2024-11-15 1 How Runtime Insights Help with Container Security
Details Website 2024-11-14 0 Palo Alto Networks Issues AI Red Alert
Details Website 2024-11-14 1 Solid Security Pro Review
Details Website 2024-11-14 1 Solid Security Pro Review
Details Website 2024-11-14 0 2025 Predictions — How One Year Will Redefine the Cybersecurity Industry
Details Website 2024-11-14 0 Mastering SAST vs. DAST: An In-Depth Guide to Application Security Testing
Details Website 2024-11-14 0 Why Cybersecurity in Channel Partnerships Matters More Than Ever?