Common Information
Type Value
Value
Vulnerability Scanning - T1595.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may scan victims for vulnerabilities that can be used during targeting. Vulnerability scans typically check if the configuration of a target host/application (ex: software and version) potentially aligns with the target of a specific exploit the adversary may seek to use. These scans may also include more broad attempts to [Gather Victim Host Information](https://attack.mitre.org/techniques/T1592) that can be used to identify more commonly known, exploitable vulnerabilities. Vulnerability scans typically harvest running software and version numbers via server banners, listening ports, or other network artifacts.(Citation: OWASP Vuln Scanning) Information from these scans may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190)).
Details Published Attributes CTI Title
Details Website 2024-11-14 4 Vulnerability Analysis on Metasploitable 2 Using Nessus Essentials
Details Website 2024-11-14 5 ICS Vulnerabilities Report: Key Security Issues & Mitigation Tips
Details Website 2024-11-13 0 What is ASPM: All You Need To Know About Robust Cyber-Security Inside APIs
Details Website 2024-11-13 0 Securing a Clear Vision: How Houston Eye Associates Focuses on Cybersecurity
Details Website 2024-11-13 0 Which Certificate is Best for Cybersecurity?
Details Website 2024-11-13 2 Which course is right for cyber security? A guide to choose the right path for your career
Details Website 2024-11-13 2 CISA's secure software deployment push: Key takeaways for AppSec teams
Details Website 2024-11-13 1 Solid Security Pro Review
Details Website 2024-11-13 0 Top 5 Essential Cybersecurity Tools in 2025 to Protect Your Business
Details Website 2024-11-13 0 Artificial Intelligence automates Penetration Testing
Details Website 2024-11-13 1 Solid Security Pro Overall Effectiveness Review
Details Website 2024-11-13 1 Sealing Entry Points and Weak Links in the Environment - How Dell is Building an Iron Wall of Defense
Details Website 2024-11-13 2 CISA's secure software deployment push: Key takeaways for AppSec teams
Details Website 2024-11-12 0 How Red and Purple Teaming Reduce Cyber Risk Across the Cybersecurity Compass
Details Website 2024-11-12 0 The Most Powerful Android Penetration Testing Tool: A Deep Dive into Drozer
Details Website 2024-11-12 1 Solid Security Pro Review
Details Website 2024-11-12 8 An In-Depth Guide to the Penetration Testing Framework
Details Website 2024-11-12 1 Solid Security Pro User Experience review
Details Website 2024-11-12 8 Mastering Reconnaissance Part 2: Advanced Scanning, Content Discovery, and Automation for Bug…
Details Website 2024-11-12 6 Multiple Vulnerabilities in Citrix Products Could Allow for Remote Code Execution
Details Website 2024-11-12 19 Multiple Vulnerabilities in Ivanti Endpoint Manager Could Allow for Remote Code Execution
Details Website 2024-11-12 49 Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
Details Website 2024-11-11 1 Solid Security Pro Two-Factor Authentication Review
Details Website 2024-11-11 1 D-Link to Not Fix Critical Bug Found in End-of-Life NAS Devices
Details Website 2024-11-11 1 Solid Security Pro Review