Common Information
Type Value
Value
Network Topology - T1590.004
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may gather information about the victim's network topology that can be used during targeting. Information about network topologies may include a variety of details, including the physical and/or logical arrangement of both external-facing and internal network environments. This information may also include specifics regarding network devices (gateways, routers, etc.) and other infrastructure. Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about network topologies may also be exposed to adversaries via online or other accessible data sets (ex: [Search Victim-Owned Websites](https://attack.mitre.org/techniques/T1594)).(Citation: DNS Dumpster) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133)).
Details Published Attributes CTI Title
Details Website 2016-05-11 6 Building and Scaling the Fastly Network, Part 1: Fighting the FIB
Details Website 2016-02-09 14 Poseidon Group: a Targeted Attack Boutique specializing in global cyber-espionage
Details Website 2015-11-28 2 Zarp - Network Attack Tool - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2015-10-20 0 Why Every Network Needs a Doctor | Radware Blog
Details Website 2015-09-29 0 Distributed Information Processing in Biological and Computational Systems | the morning paper
Details Website 2015-08-16 0 Hexacorn | Blog Are you a Canon or Nikon?
Details Website 2015-07-10 0 Opinion: The Security Case for Software Defined Networking
Details Website 2015-06-24 1 Simplicity, Courtesy of the Cloud
Details Website 2015-04-10 154 China's Great Cannon
Details Website 2015-03-03 2 DNA Sequencing: Not Quite HPC Yet
Details Website 2015-02-19 10 The Internet of Things–Ready Infrastructure
Details Website 2015-02-18 0 TAG: A Tiny Aggregation Service for ad-hoc Sensor Networks | the morning paper
Details Website 2014-06-18 20 One VPN to rule them all | Malwarebytes Labs
Details Website 2013-04-18 13 Permission to Spy: An Analysis of Android Malware Targeting Tibetans
Details Website 2013-03-28 88 IPv6: how and why it enables Internet evolution
Details Website 2012-02-16 2 Agile Security
Details Website 2011-11-14 2 PFIC 2011 Review
Details Website 2010-12-03 50 Nov 19 CVE-2010-2883 with Flash JIT Spray (PDF in PDF) Event Invitation from The Heritage Foundation from spoofed Heritage address
Details Website 2010-09-23 10 BruCON 2010 : Day 0x1 | Corelan Cybersecurity Research
Details Website 2006-10-20 15 Public ASG V7 BETA released