4Şub
Attack surface when no incoming port is open
Let's assume that the only attack to be feared on a computer is one via the network in which the machine is embedded.
What options does an attacker have if the machine has no open incoming ports?
(For example: NMAP cannot find a service with an open port.)