Common Information
Type Value
Value
Network Topology - T1590.004
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may gather information about the victim's network topology that can be used during targeting. Information about network topologies may include a variety of details, including the physical and/or logical arrangement of both external-facing and internal network environments. This information may also include specifics regarding network devices (gateways, routers, etc.) and other infrastructure. Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about network topologies may also be exposed to adversaries via online or other accessible data sets (ex: [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: DNS Dumpster) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133)).
Details Published Attributes CTI Title
Details Website 2024-11-16 0 The Mindset of a Penetration Tester
Details Website 2024-11-14 24 Major cyber attacks and data breaches of 2024
Details Website 2024-11-14 0 Datto review | TechRadar | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-13 3 Top challenges for implementing multi-domain correlation in the cloud
Details Website 2024-11-13 1 Top challenges for implementing multi-domain correlation in the cloud
Details Website 2024-11-12 0 Cybersecurity jobs available right now: November 12, 2024 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-11 1 A Comprehensive Guide to Networking: Building a Foundation for Cybersecurity Professionals
Details Website 2024-10-27 0 What is OSI and TCP/IP model ?
Details Website 2024-10-24 38 Networking Essentials (tryhackme)
Details Website 2024-10-24 28 Networking Concepts (tryhackme)
Details Website 2024-10-24 36 TryHackMe — Networking Essentials| Cyber Security 101 (THM)
Details Website 2024-10-23 26 Networking Concepts | Cyber Security 101 (THM)
Details Website 2024-10-22 1 CISA proposes new security requirements to protect govt, personal data
Details Website 2024-10-16 4 How to Configure SafeLine WAF to Correctly Obtain the Source IP
Details Website 2024-10-15 1 Cybersecurity and Digitalization: A Cautionary Tale | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-10-14 1 Unveiling Network Clarity with Infoblox Universal Asset Insights
Details Website 2024-10-14 0 Kaspersky launches several cybersecurity solutions to safeguard industrial companies | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-10-14 0 The new Catalyst ESS9300: Transforming critical military communications through open standards
Details Website 2024-10-10 3 A Modern Playbook for Ransomware | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-10-09 6 Challenges with IP spoofing in cloud environments | Datadog Security Labs
Details Website 2024-10-01 0 Network Perception Acquisition Strengthens Industrial Cyber Defense with Network Segmentation and Access Analysis | Dragos
Details Website 2024-09-29 0 The Apex of Global Cybersecurity: A Zero Trust, AI-Powered, Self-Replicating Defense System for G7…
Details Website 2024-09-28 0 TryHackMe | Unified Kill Chain
Details Website 2024-09-27 0 OSI Layers and Common Attacks on Each Layer
Details Website 2024-09-27 44 30 Advanced Google Dork Queries for Uncovering Hidden Data and OSINT Insights