Email Addresses (T1589.002)

View on ATT&CK

In Playbook

Technique & Subtechniques

Associated Tactics

  • Reconnaissance

Reconnaissance (TA0043)

The adversary is trying to gather information they can use to plan future operations. Reconnaissance consists of techniques that involve adversaries actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel. This information can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using gathered information to plan and execute Initial Access, to scope and prioritize post-compromise objectives, or to drive and lead further Reconnaissance efforts.

View on ATT&CK

Procedure Examples

Description Source(s)
Dr. Nestori Syynimaa. (2020, June 13). Just looking: Azure Active Directory reconnaissance as an outsider. Retrieved May 27, 2022. Azure Active Directory Reconnaisance
gremwell. (2020, March 24). Office 365 User Enumeration. Retrieved May 27, 2022. GitHub Office 365 User Enumeration
GrimHacker. (2017, July 24). Office365 ActiveSync Username Enumeration. Retrieved December 9, 2021. GrimBlog UsernameEnum
Hackers Arise. (n.d.). Email Scraping and Maltego. Retrieved October 20, 2020. HackersArise Email
Ng, A. (2019, January 17). Massive breach leaks 773 million email addresses, 21 million passwords. Retrieved October 20, 2020. CNET Leaks