Common Information
Type | Value |
---|---|
Value |
Network Topology - T1590.004 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather information about the victim's network topology that can be used during targeting. Information about network topologies may include a variety of details, including the physical and/or logical arrangement of both external-facing and internal network environments. This information may also include specifics regarding network devices (gateways, routers, etc.) and other infrastructure. Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about network topologies may also be exposed to adversaries via online or other accessible data sets (ex: [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: DNS Dumpster) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-09-26 | 2 | Top 5 Essential Penetration Testing Tools: A Detailed Guide | ||
Details | Website | 2024-09-25 | 0 | TURN and anycast: making peer connections work globally | ||
Details | Website | 2024-09-25 | 0 | Understanding OT Cybersecurity Audits: A Comprehensive Guide | ||
Details | Website | 2024-09-22 | 0 | Introduction to DSA in Cybersecurity | ||
Details | Website | 2024-09-10 | 6 | Packet Tracer Lab — Configure Network Devices with SSH | ||
Details | Website | 2024-09-10 | 0 | What You Need in ICS Network Visibility & Monitoring Software | Dragos | ||
Details | Website | 2024-09-02 | 0 | Network Topology with Cisco Packet Tracer | ||
Details | Website | 2024-09-01 | 1 | Reconnaissance: The Offensive Team | ||
Details | Website | 2024-08-31 | 2 | TCP/IP Networking Model | ||
Details | Website | 2024-08-31 | 2 | Active Reconnaissance: Quick Rundown | ||
Details | Website | 2024-08-31 | 0 | Jack of All, Master of None: The Cybersecurity Enthusiast’s Dilemma | ||
Details | Website | 2024-08-28 | 3 | Fuzzing µC/OS protocol stacks, Part 3: TCP/IP server fuzzing, implementing a TAP driver | ||
Details | Website | 2024-08-27 | 0 | Bitdefender a Top Performer in New Independent Tests | ||
Details | Website | 2024-08-27 | 0 | Bitdefender a Top Performer in New Independent Tests | ||
Details | Website | 2024-08-08 | 1 | What’s New in GravityZone Platform August 2024 (v 6.53) | ||
Details | Website | 2023-12-01 | 3 | Opening Critical Infrastructure: The Current State of Open RAN Security | ||
Details | Website | 2023-12-01 | 3 | Opening Critical Infrastructure: The Current State of Open RAN Security | ||
Details | Website | 2023-11-14 | 0 | AWS Security Profile: Tom Scholl, VP and Distinguished Engineer, AWS | Amazon Web Services | ||
Details | Website | 2023-11-07 | 0 | NSFOCUS WAF Running Modes - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. | ||
Details | Website | 2023-11-06 | 2 | Search | arXiv e-print repository | ||
Details | Website | 2023-08-28 | 4 | 5G security – how to minimise the threats to a 5G network | ||
Details | Website | 2023-08-23 | 0 | Traditional WAN vs. SD-WAN: Everything You Need to Know | ||
Details | Website | 2023-08-17 | 0 | 12 Questions You Should Ask When Choosing An MXDR | ||
Details | Website | 2023-08-09 | 0 | OSI MODEL LAYERS EXPLANATION | ||
Details | Website | 2023-08-08 | 0 | Penetration Testing: The Art of Reconnaissance |