(Created page with "The adversary is trying to gather information they can use to plan future operations. Reconnaissance consists of techniques that involve adversaries actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel. This information can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using gathered information to p...") |
m (Protected "Category:Reconnaissance" ([Edit=Allow only administrators] (indefinite) [Move=Allow only administrators] (indefinite))) |
||
(5 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
=Description= | |||
Reconnaissance refers to the initial stage of a cyber attack where the attacker collects information about a potential target. The information gathered during this phase can include details about the target organization, its infrastructure, and employees. The attacker can gather this information actively or passively and use it to develop strategies for further access, identifying post-compromise objectives, and continuing reconnaissance efforts. This information is crucial in planning a successful attack and helps the attacker to acquire knowledge that will aid in developing an effective attack plan. | |||
Reconnaissance |
Latest revision as of 13:35, 1 April 2023
Description
Reconnaissance refers to the initial stage of a cyber attack where the attacker collects information about a potential target. The information gathered during this phase can include details about the target organization, its infrastructure, and employees. The attacker can gather this information actively or passively and use it to develop strategies for further access, identifying post-compromise objectives, and continuing reconnaissance efforts. This information is crucial in planning a successful attack and helps the attacker to acquire knowledge that will aid in developing an effective attack plan.
Subcategories
This category has the following 2 subcategories, out of 2 total.
A
- Active Scanning (3 P)
P
- Phishing for Information (3 P)