Gather Victim Network Information

DNS

Domain Properties

IP Addresses

Network Security Appliances

Network Topology

Network Trust Dependencies

Last updated