Security Technologies and Applications
Security Technologies and Applications
-
Best Practices
- Best Practices for Using Huawei Accounts
- Best Practices in Enabling High-Risk Ports
- Disposal of Spam Mails Sent to External Systems
- UDP-based Amplification Attack Check
- Host Security Checks
- General Reference
On this page
Show all
Help Center/
Security Technologies and Applications/
Best Practices/
Host Security Checks/
Hosts Security Issues/
External Attacks: Port Scan
Copied.
External Attacks: Port Scan
What Is Port Scan?
In a port scan attack, an attacker sends a request to the IP address of a target server or workstation to discover open ports, and exploit vulnerabilities through the port to launch attacks.
Cases
The following are several cases of port scan attacks on hosts:
- Case 1:
- The host is scanning a large number of external ports 6379, as shown in Figure 1.
- The query result shows that these IP addresses are from different countries/regions.
- Case 2:
- An abnormal process is detected on the host, as shown in Figure 2.
- The query result shows that the IP address connects to C&C.
C&C refers to command and control, a communication mode between hosts.
A C&C host sends commands to a victim system and receives data from the system.
Parent topic: Hosts Security Issues
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.
Chatbot