Common Information
Type Value
Value
WHOIS - T1596.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may search public WHOIS data for information about victims that can be used during targeting. WHOIS data is stored by regional Internet registries (RIR) responsible for allocating and assigning Internet resources such as domain names. Anyone can query WHOIS servers for information about a registered domain, such as assigned IP blocks, contact information, and DNS nameservers.(Citation: WHOIS) Adversaries may search WHOIS data to gather actionable information. Threat actors can use online resources or command-line utilities to pillage through WHOIS data for information about potential victims. Information from these sources may reveal opportunities for other forms of reconnaissance (ex: [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/techniques/T1598)), establishing operational resources (ex: [Acquire Infrastructure](https://attack.mitre.org/techniques/T1583) or [Compromise Infrastructure](https://attack.mitre.org/techniques/T1584)), and/or initial access (ex: [External Remote Services](https://attack.mitre.org/techniques/T1133) or [Trusted Relationship](https://attack.mitre.org/techniques/T1199)).
Details Published Attributes CTI Title
Details Website 2024-11-16 12 Unlock Your Hacking Potential: 20 Essential Linux Commands Every Cybersecurity Student Must Know
Details Website 2024-11-14 1 Why I Created ScamSniper: One Too Many Scam Emails Later…
Details Website 2024-11-12 8 Information Gathering — Web Edition Skills Assessment — HTB Academy
Details Website 2024-11-08 7 How I Combined WHOIS, DNS, and Shodan in One Powerful Python Script
Details Website 2024-11-08 11 Google's mysterious 'search.app' links leave Android users concerned
Details Website 2024-11-07 4 Essential Terms for Cybersecurity Conversations: Security and Key Tech Lingo A-Z
Details Website 2024-11-07 12 Category
Details Website 2024-11-06 5 LETSDEFEND: SOC140 — Phishing Mail Detected — Suspicious Task Scheduler
Details Website 2024-11-06 12 Mastering Bug Hunting: A Beginner’s Guide to Effective Methodologies
Details Website 2024-11-06 1 What Is Doxing On Social Media?
Details Website 2024-11-04 13 Lab Writeup: Hawkeye
Details Website 2024-11-03 8 Lab Writeup: Tomcat Takeover
Details Website 2024-11-03 0 Cybersecurity Web Reconnaissance: Web Crawling Explained
Details Website 2024-11-03 2 How to Search like a Hacker and earn $$$
Details Website 2024-11-01 10 TryHackMe | Networking Core Protocols | Write Up
Details Website 2024-10-31 0 Essential Open-Source Security Tools: From Vulnerability Scanning to AI Safety
Details Website 2024-10-30 1 Inside the Mind of ‘The Gibson’: Ethics, Activism, and the Evolution of Hacking
Details Website 2024-10-30 0 Difference between Footprinting and Fingerprinting.
Details Website 2024-10-30 48 Case Study-Digital Forensic Analysis of Malware Infected Machine
Details Website 2024-10-29 14 Scenario:
Details Website 2024-10-29 8 Pulsedive | Leveraging Threat Intelligence in SecOps
Details Website 2024-10-28 25 DAY 36
Details Website 2024-10-27 1 PRODUCT REVIEW: Fortra’s Digital Brand Protection Solution - Cybersecurity Insiders
Details Website 2024-10-26 6 Bug Hunting Methodology
Details Website 2024-10-25 0 Unlocking the Secrets Behind an Email: A Guide to Reverse Email Engineering, Techniques, and Tools