(Removed redirect to Reconnaissance) Tags: Removed redirect Reverted Visual edit |
No edit summary Tag: Manual revert |
||
Line 1: | Line 1: | ||
The attacker is attempting to acquire knowledge that will aid in planning future actions. The process of reconnaissance involves the attacker gathering information either actively or passively, which can be used to identify potential targets. This information can include details about the organization, infrastructure, or employees. The attacker can then use this information to develop strategies for gaining initial access, determining post-compromise objectives, and continuing reconnaissance efforts. | The attacker is attempting to acquire knowledge that will aid in planning future actions. The process of reconnaissance involves the attacker gathering information either actively or passively, which can be used to identify potential targets. This information can include details about the organization, infrastructure, or employees. The attacker can then use this information to develop strategies for gaining initial access, determining post-compromise objectives, and continuing reconnaissance efforts. | ||
Revision as of 13:46, 28 January 2023
The attacker is attempting to acquire knowledge that will aid in planning future actions. The process of reconnaissance involves the attacker gathering information either actively or passively, which can be used to identify potential targets. This information can include details about the organization, infrastructure, or employees. The attacker can then use this information to develop strategies for gaining initial access, determining post-compromise objectives, and continuing reconnaissance efforts.
Subcategories
This category has the following 2 subcategories, out of 2 total.
A
- Active Scanning (3 P)
P
- Phishing for Information (3 P)