← Back to Explore
T1590
Gather Victim Network Information
Adversaries may gather information about the victim's networks that can be used during targeting. Information about networks may include a variety of details, including administrative data (ex: IP ranges, domain names, etc.) as well as specifics regarding its topology and operations. Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Information](https://attack.mitre.org/tec...
PRE
4
Detections
3
Sources
3
Threat Actors
BY SOURCE
2sigma1elastic1splunk_escu
PROCEDURES (3)
Exfiltrat2 detections
Auto-extracted: 2 detections for exfiltrat
General Monitoring1 detections
Auto-extracted: 1 detections for general monitoring
Dns1 detections
Auto-extracted: 1 detections for dns