Common Information
Type | Value |
---|---|
Value |
DNS - T1590.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather information about the victim's DNS that can be used during targeting. DNS information may include a variety of details, including registered name servers as well as records that outline addressing for a target’s subdomains, mail servers, and other hosts. DNS, MX, TXT, and SPF records may also reveal the use of third party cloud and SaaS providers, such as Office 365, G Suite, Salesforce, or Zendesk.(Citation: Sean Metcalf Twitter DNS Records) Adversaries may gather this information in various ways, such as querying or otherwise collecting details via [DNS/Passive DNS](https://attack.mitre.org/techniques/T1596/001). DNS information may also be exposed to adversaries via online or other accessible data sets (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)).(Citation: DNS Dumpster)(Citation: Circl Passive DNS) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596), [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593), or [Active Scanning](https://attack.mitre.org/techniques/T1595)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-12-31 | 2 | Explore Historic DNS -search with risk scores — Silent Push Threat Intelligence | ||
Details | Website | 2024-12-03 | 120 | Malvertisment campaigns: Uncovering more IoCs from the recent Windows Defender fraud — Silent Push Threat Intelligence | ||
Details | Website | 2024-11-30 | 4 | Exploiting Vulnerabilities in a TLD Registrar to Takeover Tether, Google, and Amazon — Palisade | ||
Details | Website | 2024-11-17 | 1 | Can Vpns Be Hacked? — Comprehensive Guide And FAQs | ||
Details | Website | 2024-11-17 | 4 | Detecting and Mitigating Portable Applications in Enterprise Environments | ||
Details | Website | 2024-11-17 | 1 | Compare Streaming VPN Services | ||
Details | Website | 2024-11-16 | 14 | Building an Integrated Threat Intelligence Platform Using Python and Kibana | ||
Details | Website | 2024-11-16 | 12 | Why Traditional Phishing Trainings fail and How Firewalls Fill the Gap | ||
Details | Website | 2024-11-16 | 25 | How I Turned a Low Blind SSRF Into a Critical Vulnerability With Strategic Impact Escalation | ||
Details | Website | 2024-11-16 | 0 | Exploring the Essentials of Hacking, Virtual Machines, Linux, and Networking | ||
Details | Website | 2024-11-16 | 0 | Here's What a Hacker Could Really Do With Access to Your Wi-Fi Router | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 0 | Mastering Recon for Bug Hunters, Part 4: Advanced Strategies & Real-World Examples | ||
Details | Website | 2024-11-16 | 2 | Setting Up Filters for Effective Wireshark Analysis | ||
Details | Website | 2024-11-16 | 1 | High-speed VPN Low Prices | ||
Details | Website | 2024-11-16 | 0 | How Internet Security Protects You from Cyber Threats | ||
Details | Website | 2024-11-16 | 6 | Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations - CyberSRC | ||
Details | Website | 2024-11-16 | 1 | Get Secure VPN Today | ||
Details | Website | 2024-11-15 | 38 | BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA | ||
Details | Website | 2024-11-15 | 38 | BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA | ||
Details | Website | 2024-11-15 | 3 | Hack The Box | Sherlock | Unit42 | ||
Details | Website | 2024-11-15 | 12 | Cybersecurity News Review — Week 46 | ||
Details | Website | 2024-11-15 | 1 | How To Authenticate Email? | ||
Details | Website | 2024-11-15 | 1 | What is DNS? The Backbone of the Internet Explained | ||
Details | Website | 2024-11-15 | 2 | Cyber Briefing: 2024.11.15 | ||
Details | Website | 2024-11-15 | 0 | 🚨 Known Brands, Government Domains, and More Hijacked via Sitting Ducks Attacks! 🚨 |