(Created page with "The adversary is trying to gather information they can use to plan future operations. Reconnaissance consists of techniques that involve adversaries actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel. This information can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using gathered information to p...") |
No edit summary |
||
Line 1: | Line 1: | ||
The | The attacker is attempting to acquire knowledge that will aid in planning future actions. The process of reconnaissance involves the attacker gathering information either actively or passively, which can be used to identify potential targets. This information can include details about the organization, infrastructure, or employees. The attacker can then use this information to develop strategies for gaining initial access, determining post-compromise objectives, and continuing reconnaissance efforts. | ||
Revision as of 00:50, 21 January 2023
The attacker is attempting to acquire knowledge that will aid in planning future actions. The process of reconnaissance involves the attacker gathering information either actively or passively, which can be used to identify potential targets. This information can include details about the organization, infrastructure, or employees. The attacker can then use this information to develop strategies for gaining initial access, determining post-compromise objectives, and continuing reconnaissance efforts.
Subcategories
This category has the following 2 subcategories, out of 2 total.
A
- Active Scanning (3 P)
P
- Phishing for Information (3 P)