Gather Victim Network Information
Adversaries may gather information about the victim's networks that can be used during targeting.
Description
Adversaries may gather information about the victim's networks that can be used during targeting.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Pre-compromiseThreat Intelligence Program
Quick Info
- Technique ID
- T1590
- Tactic
- Recon
- Sub-Techniques
- 6
- Mitigations
- 2
