This is a tricky one. My initial thought was Reconnaissance, but now I'm wondering if it could also be Gaining Access, since the attacker might be trying to exploit a vulnerability on a system listening on port 1433. I'll have to review my notes on the different attack phases.
I think the answer is Scanning. Sending a request to port 1433 across the entire company network seems like it would be part of the scanning phase, where the attacker is actively probing the network for vulnerable systems.
Hmm, I'm a bit confused on this one. I know port 1433 is used for SQL Server, but I'm not sure if that would necessarily be seen in the logs during the reconnaissance phase or a different phase. I'll have to think this through carefully.
I'm pretty sure this is asking about the reconnaissance phase, since port 1433 is commonly associated with SQL Server and scanning the network for that port could be part of the initial information gathering.
Eladia
3 months agoBrock
3 months agoTitus
3 months agoMalinda
3 months agoSamira
3 months agoChauncey
4 months agoLouvenia
4 months agoCecily
4 months agoLeonardo
4 months agoScarlet
4 months agoGail
5 months agoBenton
5 months agoChantell
5 months agoMarlon
7 months agoAntione
7 months agoJerry
7 months agoRene
6 months agoChantell
6 months agoTomoko
7 months agoFrederica
5 months agoLizette
7 months agoJovita
5 months agoDemetra
6 months agoBrandon
7 months agoGarry
7 months agoMarlon
8 months agoAdell
8 months agoTimmy
6 months agoNoah
7 months agoBrandon
8 months ago