Common Information
Type Value
Value
Network Topology - T1590.004
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may gather information about the victim's network topology that can be used during targeting. Information about network topologies may include a variety of details, including the physical and/or logical arrangement of both external-facing and internal network environments. This information may also include specifics regarding network devices (gateways, routers, etc.) and other infrastructure. Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about network topologies may also be exposed to adversaries via online or other accessible data sets (ex: [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: DNS Dumpster) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133)).
Details Published Attributes CTI Title
Details Website 2020-02-05 7 Security Advisory | SolarWinds
Details Website 2019-12-03 0 NETSCOUT Harnesses Amazon VPC Ingress Routing Enhancements for Smart Data Intelligence | NETSCOUT
Details Website 2019-09-23 0 Overcoming 5G Challenges: It’s a Life Cycle Thing | NETSCOUT
Details Website 2019-05-23 32 One year later: The VPNFilter catastrophe that wasn't
Details Website 2019-05-22 0 The Power of Location in Networks Without Borders | NETSCOUT
Details Website 2019-01-17 3 Azure Network Watcher overview and deployment
Details Website 2018-12-12 0 The evolution of Microsoft Threat Protection, December update - Microsoft Security Blog
Details Website 2018-10-03 2 APT38 | New North Korean Regime-Backed Threat Group
Details Website 2018-07-18 2 SKIDDIEs and PROs vs. Advanced Deception
Details Website 2018-07-03 29 Attacking Private Networks from the Internet with DNS Rebinding
Details Website 2018-06-28 12 virl up - NetDevOps Network Simulation Done Right
Details Website 2018-05-15 0 Riding the Wave at MPLS+SDN+NFV World Congress
Details Website 2018-03-21 2 IETF 101 Liveblog
Details Website 2017-11-23 0 Installing VMware Horizon View Security Server
Details Website 2017-10-12 0 Japan’s ABCI System Shows The Subtleties Separating AI And HPC
Details Website 2017-09-08 4 Windows Networking at Parity with Linux for Kubernetes
Details Website 2017-07-26 0 The Art of the Ethical Hack: A Q&A with CyberArk’s Head of Red Team Services
Details Website 2017-06-27 0 Hijacking Bitcoin: routing attacks on cryptocurrencies | the morning paper
Details Website 2017-06-22 0 Virtualize to Scale on Demand: Dynamic Service Function Chaining in the S/Gi-LAN
Details Website 2017-04-21 2 Trickle-down Cyber Threats: From Nation State to Common Crim - F-Secure Blog
Details Website 2017-04-12 0 Wireshark Tricks - Stephen Brennan
Details Website 2017-02-07 0 802.11s Security and Google Wifi
Details Website 2017-01-24 0
Details Website 2017-01-23 2 Wrap-up: Hack-Lab 2017#1 – Compass Security Blog
Details Website 2016-06-20 2 Using Docker Container Technology with F5 Products and Services