Common Information
Type | Value |
---|---|
Value |
IP Addresses - T1590.005 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather the victim's IP addresses that can be used during targeting. Public IP addresses may be allocated to organizations by block, or a range of sequential addresses. Information about assigned IP addresses may include a variety of details, such as which IP addresses are in use. IP addresses may also enable an adversary to derive other details about a victim, such as organizational size, physical location(s), Internet service provider, and or where/how their publicly-facing infrastructure is hosted. Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Information about assigned IP addresses may also be exposed to adversaries via online or other accessible data sets (ex: [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)).(Citation: WHOIS)(Citation: DNS Dumpster)(Citation: Circl Passive DNS) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2029-03-27 | 1 | AWS Introduces Global Condition Context Keys to Improve EC2 Security | ||
Details | Website | 2025-11-07 | 1 | Vault7 - Home | ||
Details | Website | 2024-12-30 | 27 | Interlab 인터랩 | Cyber Threat Report: RambleOn Android Malware | ||
Details | Website | 2024-12-17 | 1 | Log4shell: a threat intelligence perspective — Silent Push Threat Intelligence | ||
Details | Website | 2024-12-12 | 21 | SECCON2016取证题WriteUP - lightless blog | ||
Details | Website | 2024-12-03 | 120 | Malvertisment campaigns: Uncovering more IoCs from the recent Windows Defender fraud — Silent Push Threat Intelligence | ||
Details | Website | 2024-11-17 | 4 | How to Instantly Rotate Your IP Address Every 5 Seconds in Linux for Ultimate Anonymity | ||
Details | Website | 2024-11-17 | 0 | Business Logic Assessments: Testing Overview | ||
Details | Website | 2024-11-17 | 0 | Bengal’s probe into diversion of school grants focus on interstate cyber crime | Kolkata | #cybercrime | #infosec | National Cyber Security Consulting | ||
Details | Website | 2024-11-17 | 0 | From Detection to Response: The Power of XDR in Cybersecurity | ||
Details | Website | 2024-11-17 | 0 | AWS Security Essentials: Protecting Your Cloud Infrastructure | ||
Details | Website | 2024-11-17 | 0 | Is Your API a Backdoor for Hackers? Find Out Now | ||
Details | Website | 2024-11-17 | 0 | Is Surfshark Legal to Use? Unveil the Truth Today! | ||
Details | Website | 2024-11-17 | 2 | 🚨 Critical RCE Zero-Day Alert: Palo Alto Networks Firewalls Under Attack 🚨 | ||
Details | Website | 2024-11-16 | 18 | Browser’s Secret Diary: Memory Dumps Unveiled | ||
Details | Website | 2024-11-16 | 90 | From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 14 | Building an Integrated Threat Intelligence Platform Using Python and Kibana | ||
Details | Website | 2024-11-16 | 4 | Palo Alto Networks confirmed active exploitation of recently disclosed zero-day | ||
Details | Website | 2024-11-16 | 0 | Boost Your Cybersecurity Career With These 7 Hands-on Projects | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Network Protection Review | ||
Details | Website | 2024-11-16 | 1 | High-speed VPN Low Prices | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 0 | Understanding Hacking, Virtual Machines, Linux, and Networking: A Comprehensive Guide | ||
Details | Website | 2024-11-16 | 4 | Kali Linux : Footprinting using Spiderfoot | ||
Details | Website | 2024-11-16 | 40 | ‘Tis the season to be wary’: Huge online retail scam uncovered in the lead-up to Christmas. — Silent Push Threat Intelligence |