Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
7 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Gather Victim Network Information | Reconnaissance | Adversaries may gather information about the victim's networks that can be used during targeting. In… | Edit | |
| Gather Victim Network Information: DNS | Reconnaissance | Adversaries may gather information about the victim's DNS that can be used during targeting. DNS inf… | Edit | |
| Gather Victim Network Information: Domain Properties | Reconnaissance | Adversaries may gather information about the victim's network domain(s) that can be used during targ… | Edit | |
| Gather Victim Network Information: IP Addresses | Reconnaissance | Adversaries may gather the victim's IP addresses that can be used during targeting. Public IP addres… | Edit | |
| Gather Victim Network Information: Network Security Appliances | Reconnaissance | Adversaries may gather information about the victim's network security appliances that can be used d… | Edit | |
| Gather Victim Network Information: Network Topology | Reconnaissance | Adversaries may gather information about the victim's network topology that can be used during targe… | Edit | |
| Gather Victim Network Information: Network Trust Dependencies | Reconnaissance | Adversaries may gather information about the victim's network trust dependencies that can be used du… | Edit |