Gather Victim Network Information
DNS
Domain Properties
IP Addresses
Network Security Appliances
Network Topology
Network Trust Dependencies
Last updated