Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
7 threats — page 1 of 1
Name Category Tags Description
Gather Victim Network Information Reconnaissance Adversaries may gather information about the victim's networks that can be used during targeting. In… Edit
Gather Victim Network Information: DNS Reconnaissance Adversaries may gather information about the victim's DNS that can be used during targeting. DNS inf… Edit
Gather Victim Network Information: Domain Properties Reconnaissance Adversaries may gather information about the victim's network domain(s) that can be used during targ… Edit
Gather Victim Network Information: IP Addresses Reconnaissance Adversaries may gather the victim's IP addresses that can be used during targeting. Public IP addres… Edit
Gather Victim Network Information: Network Security Appliances Reconnaissance Adversaries may gather information about the victim's network security appliances that can be used d… Edit
Gather Victim Network Information: Network Topology Reconnaissance Adversaries may gather information about the victim's network topology that can be used during targe… Edit
Gather Victim Network Information: Network Trust Dependencies Reconnaissance Adversaries may gather information about the victim's network trust dependencies that can be used du… Edit