Common Information
Type Value
Value
DNS - T1590.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may gather information about the victim's DNS that can be used during targeting. DNS information may include a variety of details, including registered name servers as well as records that outline addressing for a target’s subdomains, mail servers, and other hosts. DNS, MX, TXT, and SPF records may also reveal the use of third party cloud and SaaS providers, such as Office 365, G Suite, Salesforce, or Zendesk.(Citation: Sean Metcalf Twitter DNS Records) Adversaries may gather this information in various ways, such as querying or otherwise collecting details via [DNS/Passive DNS](https://attack.mitre.org/techniques/T1596/001). DNS information may also be exposed to adversaries via online or other accessible data sets (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)).(Citation: DNS Dumpster)(Citation: Circl Passive DNS) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596), [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593), or [Active Scanning](https://attack.mitre.org/techniques/T1595)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133)).
Details Published Attributes CTI Title
Details Website 2024-12-31 2 Explore Historic DNS -search with risk scores — Silent Push Threat Intelligence
Details Website 2024-12-03 120 Malvertisment campaigns: Uncovering more IoCs from the recent Windows Defender fraud — Silent Push Threat Intelligence
Details Website 2024-11-30 4 Exploiting Vulnerabilities in a TLD Registrar to Takeover Tether, Google, and Amazon — Palisade
Details Website 2024-11-17 1 Can Vpns Be Hacked? — Comprehensive Guide And FAQs
Details Website 2024-11-17 4 Detecting and Mitigating Portable Applications in Enterprise Environments
Details Website 2024-11-17 1 Compare Streaming VPN Services
Details Website 2024-11-16 14 Building an Integrated Threat Intelligence Platform Using Python and Kibana
Details Website 2024-11-16 12 Why Traditional Phishing Trainings fail and How Firewalls Fill the Gap
Details Website 2024-11-16 25 How I Turned a Low Blind SSRF Into a Critical Vulnerability With Strategic Impact Escalation
Details Website 2024-11-16 0 Exploring the Essentials of Hacking, Virtual Machines, Linux, and Networking
Details Website 2024-11-16 0 Here's What a Hacker Could Really Do With Access to Your Wi-Fi Router | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-11-16 0 Mastering Recon for Bug Hunters, Part 4: Advanced Strategies & Real-World Examples
Details Website 2024-11-16 2 Setting Up Filters for Effective Wireshark Analysis
Details Website 2024-11-16 1 High-speed VPN Low Prices
Details Website 2024-11-16 0 How Internet Security Protects You from Cyber Threats
Details Website 2024-11-16 6 Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations - CyberSRC
Details Website 2024-11-16 1 Get Secure VPN Today
Details Website 2024-11-15 38 BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
Details Website 2024-11-15 38 BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
Details Website 2024-11-15 3 Hack The Box | Sherlock | Unit42
Details Website 2024-11-15 12 Cybersecurity News Review — Week 46
Details Website 2024-11-15 1 How To Authenticate Email?
Details Website 2024-11-15 1 What is DNS? The Backbone of the Internet Explained
Details Website 2024-11-15 2 Cyber Briefing: 2024.11.15
Details Website 2024-11-15 0 🚨 Known Brands, Government Domains, and More Hijacked via Sitting Ducks Attacks! 🚨