ATT&CK Matrix

Reconnaissance
10 Techniques

Scanning IP Blocks

Vulnerability Scanning

Wordlist Scanning

Client Configurations

Firmware

Hardware

Software

Credentials

Email Addresses

Employee Names

DNS (1)

Domain Properties

IP Addresses

Network Security Appliances

Network Topology

Network Trust Dependencies

Business Relationships

Determine Physical Locations

Identify Business Tempo

Identify Roles

Spearphishing Attachment (1)

Spearphishing Link

Spearphishing Service

Purchase Technical Data

Threat Intel Vendors

CDNs

DNS/Passive DNS

Digital Certificates (1)

Scan Databases

WHOIS

Code Repositories

Search Engines

Social Media