TacticReconnaissance

Reconnaissance

Reconnaissance consists of techniques that involve adversaries actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel. This information can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using gathered information to plan and execute Initial Access, to scope and prioritize post-compromise objectives, or to drive and lead further Reconnaissance efforts.

Platforms

Windows
Linux
macOS

Attack Perspective

Pre-Attack
Post-Compromise

Impact Severity

High

Detection Complexity

Medium

Techniques

T1595: Active Scanning

Adversaries may execute active reconnaissance scans to gather information that can be used during targeting. Active scans are those where the adversary probes victim infrastructure via network traffic, as opposed to passive techniques like open source intelligence gathering.

T1592: Gather Victim Host Information

Adversaries may gather information about the victim's hosts that can be used during targeting. Information about hosts may include a variety of details, including administrative data, credentials, patch levels, etc.

T1589: Gather Victim Identity Information

Adversaries may gather information about the victim's identity that can be used during targeting. Information about identities may reveal opportunities for collecting credentials or gaining access to enterprise resources.

T1590: Gather Victim Network Information

Adversaries may gather information about the victim's networks that can be used during targeting. Information about networks may include a variety of details, including administrative data (ex: IP ranges and domain names) as well as specifics regarding its topology and operations.

T1591: Gather Victim Org Information

Adversaries may gather information about the victim's organization that can be used during targeting. Information about an organization may include details regarding the victim's business operations, physical locations, key personnel, and current position.

Loading problems...