Joined Adversary Simulation Manual
More
Search
Ctrl + K
Reconnaissance
Previous
Joined Adversary Simulation Manual
Next
Active Scanning
Last updated
3 years ago
Active Scanning
Gather Victim Host Information
Gather Victim Identity Information
Gather Victim Network Information
Gather Victim Org Information
Phishing for Information
Search Closed Sources
Search Open Technical Databases
Search Open Websites/Domains
Search Victim-Owned Websites