Common Information
Type | Value |
---|---|
Value |
Network Topology - T1590.004 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather information about the victim's network topology that can be used during targeting. Information about network topologies may include a variety of details, including the physical and/or logical arrangement of both external-facing and internal network environments. This information may also include specifics regarding network devices (gateways, routers, etc.) and other infrastructure. Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about network topologies may also be exposed to adversaries via online or other accessible data sets (ex: [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: DNS Dumpster) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2016-05-11 | 6 | Building and Scaling the Fastly Network, Part 1: Fighting the FIB | ||
Details | Website | 2016-02-09 | 14 | Poseidon Group: a Targeted Attack Boutique specializing in global cyber-espionage | ||
Details | Website | 2015-11-28 | 2 | Zarp - Network Attack Tool - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2015-10-20 | 0 | Why Every Network Needs a Doctor | Radware Blog | ||
Details | Website | 2015-09-29 | 0 | Distributed Information Processing in Biological and Computational Systems | the morning paper | ||
Details | Website | 2015-08-16 | 0 | Hexacorn | Blog Are you a Canon or Nikon? | ||
Details | Website | 2015-07-10 | 0 | Opinion: The Security Case for Software Defined Networking | ||
Details | Website | 2015-06-24 | 1 | Simplicity, Courtesy of the Cloud | ||
Details | Website | 2015-04-10 | 154 | China's Great Cannon | ||
Details | Website | 2015-03-03 | 2 | DNA Sequencing: Not Quite HPC Yet | ||
Details | Website | 2015-02-19 | 10 | The Internet of Things–Ready Infrastructure | ||
Details | Website | 2015-02-18 | 0 | TAG: A Tiny Aggregation Service for ad-hoc Sensor Networks | the morning paper | ||
Details | Website | 2014-06-18 | 20 | One VPN to rule them all | Malwarebytes Labs | ||
Details | Website | 2013-04-18 | 13 | Permission to Spy: An Analysis of Android Malware Targeting Tibetans | ||
Details | Website | 2013-03-28 | 88 | IPv6: how and why it enables Internet evolution | ||
Details | Website | 2012-02-16 | 2 | Agile Security | ||
Details | Website | 2011-11-14 | 2 | PFIC 2011 Review | ||
Details | Website | 2010-12-03 | 50 | Nov 19 CVE-2010-2883 with Flash JIT Spray (PDF in PDF) Event Invitation from The Heritage Foundation from spoofed Heritage address | ||
Details | Website | 2010-09-23 | 10 | BruCON 2010 : Day 0x1 | Corelan Cybersecurity Research | ||
Details | Website | 2006-10-20 | 15 | Public ASG V7 BETA released |