Common Information
Type Value
Value
Network Topology - T1590.004
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may gather information about the victim's network topology that can be used during targeting. Information about network topologies may include a variety of details, including the physical and/or logical arrangement of both external-facing and internal network environments. This information may also include specifics regarding network devices (gateways, routers, etc.) and other infrastructure. Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about network topologies may also be exposed to adversaries via online or other accessible data sets (ex: [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: DNS Dumpster) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133)).
Details Published Attributes CTI Title
Details Website 2024-09-26 2 Top 5 Essential Penetration Testing Tools: A Detailed Guide
Details Website 2024-09-25 0 TURN and anycast: making peer connections work globally
Details Website 2024-09-25 0 Understanding OT Cybersecurity Audits: A Comprehensive Guide
Details Website 2024-09-22 0 Introduction to DSA in Cybersecurity
Details Website 2024-09-10 6 Packet Tracer Lab — Configure Network Devices with SSH
Details Website 2024-09-10 0 What You Need in ICS Network Visibility & Monitoring Software | Dragos
Details Website 2024-09-02 0 Network Topology with Cisco Packet Tracer
Details Website 2024-09-01 1 Reconnaissance: The Offensive Team
Details Website 2024-08-31 2 TCP/IP Networking Model
Details Website 2024-08-31 2 Active Reconnaissance: Quick Rundown
Details Website 2024-08-31 0 Jack of All, Master of None: The Cybersecurity Enthusiast’s Dilemma
Details Website 2024-08-28 3 Fuzzing µC/OS protocol stacks, Part 3: TCP/IP server fuzzing, implementing a TAP driver
Details Website 2024-08-27 0 Bitdefender a Top Performer in New Independent Tests
Details Website 2024-08-27 0 Bitdefender a Top Performer in New Independent Tests
Details Website 2024-08-08 1 What’s New in GravityZone Platform August 2024 (v 6.53)
Details Website 2023-12-01 3 Opening Critical Infrastructure: The Current State of Open RAN Security
Details Website 2023-12-01 3 Opening Critical Infrastructure: The Current State of Open RAN Security
Details Website 2023-11-14 0 AWS Security Profile: Tom Scholl, VP and Distinguished Engineer, AWS | Amazon Web Services
Details Website 2023-11-07 0 NSFOCUS WAF Running Modes - NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks.
Details Website 2023-11-06 2 Search | arXiv e-print repository
Details Website 2023-08-28 4 5G security – how to minimise the threats to a 5G network
Details Website 2023-08-23 0 Traditional WAN vs. SD-WAN: Everything You Need to Know 
Details Website 2023-08-17 0 12 Questions You Should Ask When Choosing An MXDR
Details Website 2023-08-09 0 OSI MODEL LAYERS EXPLANATION
Details Website 2023-08-08 0 Penetration Testing: The Art of Reconnaissance