DETECTION OVERVIEW
Risk Factors
Port scans are easy to run and have few disadvantages. After an attacker identifies services responding over an open port, they could flood that device with a large number of SYN packets to prevent legitimate requests from the network or take steps to exploit any vulnerabilities known for that service.
The system might change the risk score for this detection.
Kill Chain
Risk Score
37
An attacker initiates a TCP SYN scan to search for services listening on open ports. Port scans are a common form of reconnaissance, which an attacker will perform after the initial compromise. Tools for performing such scans are widely available, including the popular Nmap Security Scanner.