Search Open Technical Databases
Adversaries may search freely available technical databases for information about victims.
Description
Adversaries may search freely available technical databases for information about victims.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Pre-compromiseThreat Intelligence Program
Quick Info
- Technique ID
- T1596
- Tactic
- Recon
- Sub-Techniques
- 5
- Mitigations
- 2
