The attacker is attempting to acquire knowledge that will aid in planning future actions. The process of reconnaissance involves the attacker gathering information either actively or passively, which can be used to identify potential targets. This information can include details about the organization, infrastructure, or employees. The attacker can then use this information to develop strategies for gaining initial access, determining post-compromise objectives, and continuing reconnaissance efforts.
Subcategories
This category has the following 2 subcategories, out of 2 total.
A
- Active Scanning (3 P)
P
- Phishing for Information (3 P)