Common Information
Type | Value |
---|---|
Value |
Network Topology - T1590.004 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather information about the victim's network topology that can be used during targeting. Information about network topologies may include a variety of details, including the physical and/or logical arrangement of both external-facing and internal network environments. This information may also include specifics regarding network devices (gateways, routers, etc.) and other infrastructure. Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about network topologies may also be exposed to adversaries via online or other accessible data sets (ex: [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: DNS Dumpster) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-16 | 0 | The Mindset of a Penetration Tester | ||
Details | Website | 2024-11-14 | 24 | Major cyber attacks and data breaches of 2024 | ||
Details | Website | 2024-11-14 | 0 | Datto review | TechRadar | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-13 | 3 | Top challenges for implementing multi-domain correlation in the cloud | ||
Details | Website | 2024-11-13 | 1 | Top challenges for implementing multi-domain correlation in the cloud | ||
Details | Website | 2024-11-12 | 0 | Cybersecurity jobs available right now: November 12, 2024 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-11 | 1 | A Comprehensive Guide to Networking: Building a Foundation for Cybersecurity Professionals | ||
Details | Website | 2024-10-27 | 0 | What is OSI and TCP/IP model ? | ||
Details | Website | 2024-10-24 | 38 | Networking Essentials (tryhackme) | ||
Details | Website | 2024-10-24 | 28 | Networking Concepts (tryhackme) | ||
Details | Website | 2024-10-24 | 36 | TryHackMe — Networking Essentials| Cyber Security 101 (THM) | ||
Details | Website | 2024-10-23 | 26 | Networking Concepts | Cyber Security 101 (THM) | ||
Details | Website | 2024-10-22 | 1 | CISA proposes new security requirements to protect govt, personal data | ||
Details | Website | 2024-10-16 | 4 | How to Configure SafeLine WAF to Correctly Obtain the Source IP | ||
Details | Website | 2024-10-15 | 1 | Cybersecurity and Digitalization: A Cautionary Tale | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-10-14 | 1 | Unveiling Network Clarity with Infoblox Universal Asset Insights | ||
Details | Website | 2024-10-14 | 0 | Kaspersky launches several cybersecurity solutions to safeguard industrial companies | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-10-14 | 0 | The new Catalyst ESS9300: Transforming critical military communications through open standards | ||
Details | Website | 2024-10-10 | 3 | A Modern Playbook for Ransomware | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-10-09 | 6 | Challenges with IP spoofing in cloud environments | Datadog Security Labs | ||
Details | Website | 2024-10-01 | 0 | Network Perception Acquisition Strengthens Industrial Cyber Defense with Network Segmentation and Access Analysis | Dragos | ||
Details | Website | 2024-09-29 | 0 | The Apex of Global Cybersecurity: A Zero Trust, AI-Powered, Self-Replicating Defense System for G7… | ||
Details | Website | 2024-09-28 | 0 | TryHackMe | Unified Kill Chain | ||
Details | Website | 2024-09-27 | 0 | OSI Layers and Common Attacks on Each Layer | ||
Details | Website | 2024-09-27 | 44 | 30 Advanced Google Dork Queries for Uncovering Hidden Data and OSINT Insights |