Category:Reconnaissance: Difference between revisions

Category page
(Created page with "The adversary is trying to gather information they can use to plan future operations. Reconnaissance consists of techniques that involve adversaries actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel. This information can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using gathered information to p...")
 
No edit summary
Line 1: Line 1:
The adversary is trying to gather information they can use to plan future operations.
The attacker is attempting to acquire knowledge that will aid in planning future actions. The process of reconnaissance involves the attacker gathering information either actively or passively, which can be used to identify potential targets. This information can include details about the organization, infrastructure, or employees. The attacker can then use this information to develop strategies for gaining initial access, determining post-compromise objectives, and continuing reconnaissance efforts.
 
Reconnaissance consists of techniques that involve adversaries actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel. This information can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using gathered information to plan and execute Initial Access, to scope and prioritize post-compromise objectives, or to drive and lead further Reconnaissance efforts.

Revision as of 00:50, 21 January 2023

The attacker is attempting to acquire knowledge that will aid in planning future actions. The process of reconnaissance involves the attacker gathering information either actively or passively, which can be used to identify potential targets. This information can include details about the organization, infrastructure, or employees. The attacker can then use this information to develop strategies for gaining initial access, determining post-compromise objectives, and continuing reconnaissance efforts.

Subcategories

This category has the following 2 subcategories, out of 2 total.

Pages in category "Reconnaissance"

The following 7 pages are in this category, out of 7 total.