Trusted Design

TA0043 - Reconnaissance

戦術「Reconnaissance」に関連する攻撃手法(Technique)の一覧です。

Technique ID Name Description
T1589 Gather Victim Identity Information Adversaries may gather information about the victim's identity that can be used during targeting. Information about iden…
T1589.001 Credentials Adversaries may gather credentials that can be used during targeting. Account credentials gathered by adversaries may be…
T1589.002 Email Addresses Adversaries may gather email addresses that can be used during targeting. Even if internal instances exist, organization…
T1589.003 Employee Names Adversaries may gather employee names that can be used during targeting. Employee names be used to derive email addresse…
T1590 Gather Victim Network Information Adversaries may gather information about the victim's networks that can be used during targeting. Information about netw…
T1590.001 Domain Properties Adversaries may gather information about the victim's network domain(s) that can be used during targeting. Information a…
T1590.002 DNS Adversaries may gather information about the victim's DNS that can be used during targeting. DNS information may include…
T1590.003 Network Trust Dependencies Adversaries may gather information about the victim's network trust dependencies that can be used during targeting. Info…
T1590.004 Network Topology Adversaries may gather information about the victim's network topology that can be used during targeting. Information ab…
T1590.005 IP Addresses Adversaries may gather the victim's IP addresses that can be used during targeting. Public IP addresses may be allocated…
T1590.006 Network Security Appliances Adversaries may gather information about the victim's network security appliances that can be used during targeting. Inf…
T1591 Gather Victim Org Information Adversaries may gather information about the victim's organization that can be used during targeting. Information about …
T1591.001 Determine Physical Locations Adversaries may gather the victim's physical location(s) that can be used during targeting. Information about physical l…
T1591.002 Business Relationships Adversaries may gather information about the victim's business relationships that can be used during targeting. Informat…
T1591.003 Identify Business Tempo Adversaries may gather information about the victim's business tempo that can be used during targeting. Information abou…
T1591.004 Identify Roles Adversaries may gather information about identities and roles within the victim organization that can be used during tar…
T1592 Gather Victim Host Information Adversaries may gather information about the victim's hosts that can be used during targeting. Information about hosts m…
T1592.001 Hardware Adversaries may gather information about the victim's host hardware that can be used during targeting. Information about…
T1592.002 Software Adversaries may gather information about the victim's host software that can be used during targeting. Information about…
T1592.003 Firmware Adversaries may gather information about the victim's host firmware that can be used during targeting. Information about…
T1592.004 Client Configurations Adversaries may gather information about the victim's client configurations that can be used during targeting. Informati…
T1593 Search Open Websites/Domains Adversaries may search freely available websites and/or domains for information about victims that can be used during ta…
T1593.001 Social Media Adversaries may search social media for information about victims that can be used during targeting. Social media sites …
T1593.002 Search Engines Adversaries may use search engines to collect information about victims that can be used during targeting. Search engine…
T1593.003 Code Repositories Adversaries may search public code repositories for information about victims that can be used during targeting. Victims…
T1594 Search Victim-Owned Websites Adversaries may search websites owned by the victim for information that can be used during targeting. Victim-owned webs…
T1595 Active Scanning Adversaries may execute active reconnaissance scans to gather information that can be used during targeting. Active scan…
T1595.001 Scanning IP Blocks Adversaries may scan victim IP blocks to gather information that can be used during targeting. Public IP addresses may b…
T1595.002 Vulnerability Scanning Adversaries may scan victims for vulnerabilities that can be used during targeting. Vulnerability scans typically check …
T1595.003 Wordlist Scanning Adversaries may iteratively probe infrastructure using brute-forcing and crawling techniques. While this technique emplo…
T1596 Search Open Technical Databases Adversaries may search freely available technical databases for information about victims that can be used during target…
T1596.001 DNS/Passive DNS Adversaries may search DNS data for information about victims that can be used during targeting. DNS information may inc…
T1596.002 WHOIS Adversaries may search public WHOIS data for information about victims that can be used during targeting. WHOIS data is …
T1596.003 Digital Certificates Adversaries may search public digital certificate data for information about victims that can be used during targeting. …
T1596.004 CDNs Adversaries may search content delivery network (CDN) data about victims that can be used during targeting. CDNs allow a…
T1596.005 Scan Databases Adversaries may search within public scan databases for information about victims that can be used during targeting. Var…
T1597 Search Closed Sources Adversaries may search and gather information about victims from closed (e.g., paid, private, or otherwise not freely av…
T1597.001 Threat Intel Vendors Adversaries may search private data from threat intelligence vendors for information that can be used during targeting. …
T1597.002 Purchase Technical Data Adversaries may purchase technical information about victims that can be used during targeting. Information about victim…
T1598 Phishing for Information Adversaries may send phishing messages to elicit sensitive information that can be used during targeting. Phishing for i…
T1598.001 Spearphishing Service Adversaries may send spearphishing messages via third-party services to elicit sensitive information that can be used du…
T1598.002 Spearphishing Attachment Adversaries may send spearphishing messages with a malicious attachment to elicit sensitive information that can be used…
T1598.003 Spearphishing Link Adversaries may send spearphishing messages with a malicious link to elicit sensitive information that can be used durin…
T1598.004 Spearphishing Voice Adversaries may use voice communications to elicit sensitive information that can be used during targeting. Spearphishin…
T1681 Search Threat Vendor Data Threat actors may seek information/indicators from closed or open threat intelligence sources gathered about their own c…
T1682 Query Public AI Services Adversaries may query publicly accessible artificial intelligence (AI) services, such as large language models (LLMs), t…