Skip to content

Latest commit

 

History

History
65 lines (36 loc) · 1.67 KB

T1046.md

File metadata and controls

65 lines (36 loc) · 1.67 KB

T1046 - Network Service Scanning

Adversaries may attempt to get a listing of services running on remote hosts, including those that may be vulnerable to remote software exploitation. Methods to acquire this information include port scans and vulnerability scans using tools that are brought onto a system.

Within cloud environments, adversaries may attempt to discover services running on other cloud hosts or cloud services enabled within the environment. Additionally, if the cloud environment is connected to a on-premises environment, adversaries may be able to identify services running on non-cloud systems.

Atomic Tests


Atomic Test #1 - Port Scan

Scan ports to check for listening ports

Supported Platforms: Linux, macOS

Attack Commands: Run with sh!

for port in {1..65535};
do
  echo >/dev/tcp/192.168.1.1/$port && echo "port $port is open" || echo "port $port is closed" : ;
done


Atomic Test #2 - Port Scan Nmap

Scan ports to check for listening ports with Nmap.

Supported Platforms: Linux, macOS

Inputs:

Name Description Type Default Value
network_range Network Range to Scan. string 192.168.1.0/24
port Ports to scan. string 80
host Host to scan. string 192.168.1.1

Attack Commands: Run with sh!

nmap -sS #{network_range} -p #{port}
telnet #{host} #{port}
nc -nv #{host} #{port}