Common Information
Type | Value |
---|---|
Value |
WHOIS - T1596.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may search public WHOIS data for information about victims that can be used during targeting. WHOIS data is stored by regional Internet registries (RIR) responsible for allocating and assigning Internet resources such as domain names. Anyone can query WHOIS servers for information about a registered domain, such as assigned IP blocks, contact information, and DNS nameservers.(Citation: WHOIS) Adversaries may search WHOIS data to gather actionable information. Threat actors can use online resources or command-line utilities to pillage through WHOIS data for information about potential victims. Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133) or [Trusted Relationship](https://attack.mitre.org/techniques/T1199)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-16 | 12 | Unlock Your Hacking Potential: 20 Essential Linux Commands Every Cybersecurity Student Must Know | ||
Details | Website | 2024-11-14 | 1 | Why I Created ScamSniper: One Too Many Scam Emails Later… | ||
Details | Website | 2024-11-12 | 8 | Information Gathering — Web Edition Skills Assessment — HTB Academy | ||
Details | Website | 2024-11-08 | 7 | How I Combined WHOIS, DNS, and Shodan in One Powerful Python Script | ||
Details | Website | 2024-11-08 | 11 | Google's mysterious 'search.app' links leave Android users concerned | ||
Details | Website | 2024-11-07 | 4 | Essential Terms for Cybersecurity Conversations: Security and Key Tech Lingo A-Z | ||
Details | Website | 2024-11-07 | 12 | Category | ||
Details | Website | 2024-11-06 | 5 | LETSDEFEND: SOC140 — Phishing Mail Detected — Suspicious Task Scheduler | ||
Details | Website | 2024-11-06 | 12 | Mastering Bug Hunting: A Beginner’s Guide to Effective Methodologies | ||
Details | Website | 2024-11-06 | 1 | What Is Doxing On Social Media? | ||
Details | Website | 2024-11-04 | 13 | Lab Writeup: Hawkeye | ||
Details | Website | 2024-11-03 | 8 | Lab Writeup: Tomcat Takeover | ||
Details | Website | 2024-11-03 | 0 | Cybersecurity Web Reconnaissance: Web Crawling Explained | ||
Details | Website | 2024-11-03 | 2 | How to Search like a Hacker and earn $$$ | ||
Details | Website | 2024-11-01 | 10 | TryHackMe | Networking Core Protocols | Write Up | ||
Details | Website | 2024-10-31 | 0 | Essential Open-Source Security Tools: From Vulnerability Scanning to AI Safety | ||
Details | Website | 2024-10-30 | 1 | Inside the Mind of ‘The Gibson’: Ethics, Activism, and the Evolution of Hacking | ||
Details | Website | 2024-10-30 | 0 | Difference between Footprinting and Fingerprinting. | ||
Details | Website | 2024-10-30 | 48 | Case Study-Digital Forensic Analysis of Malware Infected Machine | ||
Details | Website | 2024-10-29 | 14 | Scenario: | ||
Details | Website | 2024-10-29 | 8 | Pulsedive | Leveraging Threat Intelligence in SecOps | ||
Details | Website | 2024-10-28 | 25 | DAY 36 | ||
Details | Website | 2024-10-27 | 1 | PRODUCT REVIEW: Fortra’s Digital Brand Protection Solution - Cybersecurity Insiders | ||
Details | Website | 2024-10-26 | 6 | Bug Hunting Methodology | ||
Details | Website | 2024-10-25 | 0 | Unlocking the Secrets Behind an Email: A Guide to Reverse Email Engineering, Techniques, and Tools |