Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee

Human-written only.

24/7 Support

Anytime, anywhere.

Plagiarism Free

100% Original.

Expert Tutors

Masters & PhDs.

100% Confidential

Your privacy matters.

On-Time Delivery

Never miss a deadline.

What are the TOP 10 Reconnaissance Methodologies

Computer Science May 08, 2022

What are the TOP 10 Reconnaissance Methodologies. Write a One Page Summary

The adversary is trying to gather information they can use to plan future operations.


Reconnaissance consists of techniques that involve adversaries actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel. This information can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using gathered information to plan and execute Initial Access, to scope and prioritize post-compromise objectives, or to drive and lead further Reconnaissance efforts.

undefined

Step 1. Go to the following website and read about the Methodologies

https://attack.mitre.org/versions/v8/tactics/TA0043/

Step 2. Write a one-page summary about the TOP 10 Methodologies.

undefined

T1592 Gather Victim Host Information
T1589 Gather Victim Identity Information
T1590 Gather Victim Network Information
T1591 Gather Victim Org Information
T1598 Phishing for Information
T1597 Search Closed Sources
T1596 Search Open Technical Databases
T1593 Search Open Websites/Domains
T1594 Search Victim-Owned Websites

Archived Solution
Unlocked Solution

You have full access to this solution. To save a copy with all formatting and attachments, use the button below.

Already a member? Sign In
Important Note: This solution is from our archive and has been purchased by others. Submitting it as-is may trigger plagiarism detection. Use it for reference only.

For ready-to-submit work, please order a fresh solution below.

Or get 100% fresh solution
Get Custom Quote
Secure Payment