Domain Properties (T1590.001)

View on ATT&CK

In Playbook

Associated Tactics

  • Reconnaissance

Reconnaissance (TA0043)

The adversary is trying to gather information they can use to plan future operations. Reconnaissance consists of techniques that involve adversaries actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel. This information can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using gathered information to plan and execute Initial Access, to scope and prioritize post-compromise objectives, or to drive and lead further Reconnaissance efforts.

View on ATT&CK

Procedure Examples

Description Source(s)
CIRCL Computer Incident Response Center. (n.d.). Passive DNS. Retrieved October 20, 2020. Circl Passive DNS
Dr. Nestori Syynimaa. (2020, June 13). Just looking: Azure Active Directory reconnaissance as an outsider. Retrieved May 27, 2022. Azure Active Directory Reconnaisance
Hacker Target. (n.d.). DNS Dumpster. Retrieved October 20, 2020. DNS Dumpster
Microsoft. (2017, January 23). (Cloud) Tip of the Day: Advanced way to check domain availability for Office 365 and Azure. Retrieved May 27, 2022. Office 265 Azure Domain Availability
NTT America. (n.d.). Whois Lookup. Retrieved October 20, 2020. WHOIS