DNS - T1590.002 (0ff59227-8aa8-4c09-bf1f-925605bd07ea)
Adversaries may gather information about the victim's DNS that can be used during targeting. DNS information may include a variety of details, including registered name servers as well as records that outline addressing for a target’s subdomains, mail servers, and other hosts. DNS, MX, TXT, and SPF records may also reveal the use of third party cloud and SaaS providers, such as Office 365, G Suite, Salesforce, or Zendesk.(Citation: Sean Metcalf Twitter DNS Records)
Adversaries may gather this information in various ways, such as querying or otherwise collecting details via DNS/Passive DNS. DNS information may also be exposed to adversaries via online or other accessible data sets (ex: Search Open Technical Databases).(Citation: DNS Dumpster)(Citation: Circl Passive DNS) Gathering this information may reveal opportunities for other forms of reconnaissance (ex: Search Open Technical Databases, Search Open Websites/Domains, or Active Scanning), establishing operational resources (ex: Acquire Infrastructure or Compromise Infrastructure), and/or initial access (ex: External Remote Services).
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Gather Victim Network Information - T1590 (9d48cab2-7929-4812-ad22-f536665f0109) | Attack Pattern | DNS - T1590.002 (0ff59227-8aa8-4c09-bf1f-925605bd07ea) | Attack Pattern | 1 |