Stratos Ally

Reconnaissance Unveiled: Enterprise Tactics Explained

Picture of StratosAlly

StratosAlly

Reconnaissance Unveiled: Enterprise Tactics Explained

Tactics define the purpose or intent behind a particular ATT&CK technique or sub-technique. They explain why an adversary performs a certain action. Each tactic reflects the attacker’s strategic objective. For example, an adversary may aim to achieve credential access as part of their mission. 

List of Enterprise Tactics (14 Total) 

ID Name Description 
TA0043 Reconnaissance The adversary is gathering information to plan future attacks. 
TA0042 Resource Development The adversary is building or acquiring resources to support operations. 
TA0001 Initial Access The adversary is attempting to penetrate your network. 
TA0002 Execution The adversary is trying to run malicious code on your systems. 
TA0003 Persistence The adversary is establishing a long-term foothold within the environment. 
TA0004 Privilege Escalation The adversary is seeking elevated permissions. 
TA0005 Defense Evasion The adversary is trying to avoid detection by defenses. 
TA0006 Credential Access The adversary is attempting to steal account credentials. 
TA0007 Discovery The adversary is exploring your environment to gather more information. 
TA0008 Lateral Movement The adversary is moving through the network to access more systems. 
TA0009 Collection The adversary is gathering data relevant to their objective. 
TA0011 Command and Control The adversary is maintaining communication with compromised systems for remote control. 
TA0010 Exfiltration The adversary is stealing data from your network. 
TA0040 Impact The adversary attempts to manipulate, disrupt, or destroy systems and data. 

Each of these tactics represents a key phase of an adversary’s campaign, from initial access to impact. Understanding them helps organizations to foresee, detect, and respond to attacks effectively. 

Reconnaissance: The First Step in an Adversary’s Playbook 

Reconnaissance is the most used technique in the initial phases of a cyber attack. In this phase, attackers collect information related to a target about their IP addresses, domain names, software versions, and information regarding employees. This intelligence plays an essential role in further steps. 
 

Common Reconnaissance Techniques in the MITRE ATT&CK Framework 

The MITRE ATT&CK framework outlines various techniques attackers use to gain intelligence. Below are key reconnaissance methods with examples and defense strategies: 

1. Active Scanning (T1595) 

Active scanning involves directly interacting with a target to search for an open port, service, or vulnerability. While this approach yields precise information, it is noisy and may trigger detection. 

  • Examples: 
  • Port Scanning using Nmap 
  • Vulnerability Scanning with Nessus or OpenVAS 
  • Defensive Strategy: 
      With IDS enabled and a rate limiter, scan activities should be flagged as suspicious. 

2. Search Open Technical Databases (T1596) 

Attackers utilize publicly available data containing their intended target’s security bulletins, GitHub repositories, or CVE databases to look for software vulnerabilities. 

  • Example: 
      Monitor public forums and Pastebin for leaked credentials and insider information. 
  • Defensive Strategy: 
      The organization can regularly monitor dark web sources for exposed data and maintain a good vulnerability management program. 

3. Gather Victim Identity Information (T1589) 

Adversaries collect user information or employee credentials, using which they can launch phishing campaigns or social engineering attacks. 

  • Examples: 
  • Harvesting email addresses from open sources such as LinkedIn
  • Mapping of employee roles and relationships in OSINT (Open Source Intelligence) 
  • Defensive Strategy: 
      Deploy filters in an e-mail system and use multi-factor authentication to prevent identity-based attacks. 

4. Search Open Websites/Domains (T1590) 

Public-facing sites, DNS records, and certificates offer juicy information for attackers to outline the structure of an organization. Subdomain enumeration is one of the most common methods in this category. 

  • Example: 
      Using tools such as Shodan or Censys to identify exposed devices and IP addresses. 
  • Defensive Strategy: 
      Practice website hardening and control what data is publicly visible to minimize exposure. 

5. Gather Network Information (T1597) 

Attackers would attempt to find the network architecture, the internal IP ranges, and protocols to plan their next move (such as lateral movement) inside the network.   

  • Examples: 
  • Zone transfer through DNS. 
  • VPN endpoint or access portal inspection 
  • Defensive Strategy: 
      Implement network segmentation and monitor for unusual traffic patterns, so that reconnaissance can be identified early. 

6. Phishing for Information (T1598) 

Attackers use phishing emails to trick users into revealing sensitive information, such as network configurations or passwords. 

  • Example: 
      Crafting fake login portals asking a user to reset her/his password. 

Defensive Strategy: 

Conduct regular security awareness training and deploy anti-phishing tools to prevent such attacks. 

Why Reconnaissance Matters 

Reconnaissance is like performing surveillance before the actual crime can be committed. The attacker uses this to spot any weakness or open entry and strategize how they would penetrate the network. If not recognized, the other phases allow the attackers to gain an elusive edge as they continue to exploit the vulnerabilities.  

Reconnaissance activities should be identified and stopped by cybersecurity teams as early as possible to prevent attackers from advancing further. 

Caught feelings for cybersecurity? It’s okay, it happens. Follow us on LinkedIn and Instagram to keep the spark alive.

more Related articles