Active Scanning
Adversaries may execute active reconnaissance scans to gather information that can be used during targeting. Active scans are those where the adversary probes victim infrastructure via network traffic, as opposed to other forms of reconnaissance that do not involve direct interaction. Adversaries may perform different forms of active scanning depending on what information they seek to gather. These scans can also be performed in various ways, including using native features of network protocols...
BY SOURCE
PROCEDURES (14)
Auto-extracted: 4 detections for network connection monitoring
Auto-extracted: 3 detections for service
Auto-extracted: 2 detections for exfiltrat
Auto-extracted: 2 detections for api
Auto-extracted: 2 detections for unusual
Auto-extracted: 2 detections for c2
Auto-extracted: 2 detections for dump
Auto-extracted: 1 detections for http
Auto-extracted: 1 detections for http
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for process creation monitoring
Auto-extracted: 1 detections for suspicious