EXPLORE
← Back to Explore
T1592

Gather Victim Host Information

Adversaries may gather information about the victim's hosts that can be used during targeting. Information about hosts may include a variety of details, including administrative data (ex: name, assigned IP, functionality, etc.) as well as specifics regarding its configuration (ex: operating system, language, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Informati...

PRE
4
Detections
1
Sources
1
Threat Actors

BY SOURCE

4splunk_escu

PROCEDURES (3)

Service2 detections

Auto-extracted: 2 detections for service

Lateral1 detections

Auto-extracted: 1 detections for lateral

Lateral1 detections

Auto-extracted: 1 detections for lateral

THREAT ACTORS (1)

DETECTIONS (4)