Searching
..

Click anywhere to stop

Scan

Publication Date 12/26/2017
Description

Description

A Scan attack is performed by cyber-assailants in a process of initial information-gathering known as footprinting. Scan attacks are used mostly to identify and enumerate active hosts on a network, and to determine the host operating system and available UDP and TCP network services that are running on the targeted hosts.

A successful Scan attack can result in information disclosure.