5.0k views
3 votes
Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?



1 Answer

5 votes

Answer: It depends, but it is definitely a networking attack.

Step-by-step explanation:

After scanning for vulnerable ports, I could go in a number of different directions. I could initiate a DOS attack by flooding a vulnerable port with requests. I could also initiate a Man-in-the-Middle attack by intercepting their network traffic (usually through port 80(HTTP) if it's not encryped). Because of this, it is highly recommended to use a VPN, so hackers have a harder time getting your data