ATT&CK Matrix
Reconnaissance
10 Techniques
Scanning IP Blocks
Vulnerability Scanning
Wordlist Scanning
Client Configurations
Firmware
Hardware
Software
Credentials
Email Addresses
Employee Names
DNS (1)
Domain Properties
IP Addresses
Network Security Appliances
Network Topology
Network Trust Dependencies
Business Relationships
Determine Physical Locations
Identify Business Tempo
Identify Roles
Spearphishing Attachment (1)
Spearphishing Link
Spearphishing Service
Purchase Technical Data
Threat Intel Vendors
CDNs
DNS/Passive DNS
Digital Certificates (1)
Scan Databases
WHOIS
Code Repositories
Search Engines
Social Media