← Back to Explore
T1592
Gather Victim Host Information
Adversaries may gather information about the victim's hosts that can be used during targeting. Information about hosts may include a variety of details, including administrative data (ex: name, assigned IP, functionality, etc.) as well as specifics regarding its configuration (ex: operating system, language, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) or [Phishing for Informati...
PRE
4
Detections
1
Sources
1
Threat Actors
BY SOURCE
4splunk_escu
PROCEDURES (3)
Service2 detections
Auto-extracted: 2 detections for service
Lateral1 detections
Auto-extracted: 1 detections for lateral
Lateral1 detections
Auto-extracted: 1 detections for lateral