Tactics
  • Collection
  • Command and Control
  • Credential Access
  • Defense Evasion
  • Discovery
  • Execution
  • Exfiltration
  • Impact
  • Initial Access
  • Lateral Movement
  • Persistence
  • Privilege Escalation
  • Reconnaissance
  • Resource Development

Reconnaissance

Id Name
11 Active Scanning
50 Business Relationships
52 CDNs
60 Client Configurations
102 Credentials
112 DNS
116 DNS/Passive DNS
136 Determine Physical Locations
140 Digital Certificates
161 Domain Properties
178 Email Addresses
182 Employee Names
222 Firmware
228 Gather Victim Host Information
229 Gather Victim Identity Information
230 Gather Victim Network Information
231 Gather Victim Org Information
236 Hardware
245 IP Addresses
246 Identify Business Tempo
247 Identify Roles
329 Network Security Appliances
334 Network Topology
335 Network Trust Dependencies
368 Phishing for Information
390 Purchase Technical Data
429 Scan Databases
430 Scanning IP Blocks
437 Search Closed Sources
438 Search Engines
439 Search Open Technical Databases
440 Search Open Websites/Domains
441 Search Victim-Owned Websites
462 Social Media
465 Software
472 Spearphishing Attachment
474 Spearphishing Link
475 Spearphishing Service
508 Threat Intel Vendors
543 Vulnerability Scanning
544 WHOIS