Vulnerability Scanning
Adversaries may scan victims for vulnerabilities that can be used during targeting. Vulnerability scans typically check if the configuration of a target host/application (ex: software and version) potentially aligns with the target of a specific exploit the adversary may seek to use. These scans may also include more broad attempts to [Gather Victim Host Information](https://attack.mitre.org/techniques/T1592) that can be used to identify more commonly known, exploitable vulnerabilities. Vulnera...
BY SOURCE
PROCEDURES (8)
Auto-extracted: 3 detections for lateral
Auto-extracted: 2 detections for unusual
Auto-extracted: 2 detections for network connection monitoring
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for general monitoring
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for suspicious