DNS (T1590.002)

View on ATT&CK

In Playbook

Associated Tactics

  • Reconnaissance

Reconnaissance (TA0043)

The adversary is trying to gather information they can use to plan future operations. Reconnaissance consists of techniques that involve adversaries actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel. This information can be leveraged by the adversary to aid in other phases of the adversary lifecycle, such as using gathered information to plan and execute Initial Access, to scope and prioritize post-compromise objectives, or to drive and lead further Reconnaissance efforts.

View on ATT&CK

Procedure Examples

Description Source(s)
CIRCL Computer Incident Response Center. (n.d.). Passive DNS. Retrieved October 20, 2020. Circl Passive DNS
CISA. (2016, September 29). DNS Zone Transfer AXFR Requests May Leak Domain Information. Retrieved June 5, 2024. DNS-CISA
Hacker Target. (n.d.). DNS Dumpster. Retrieved October 20, 2020. DNS Dumpster
Scanning Alexa's Top 1M for AXFR. (2015, March 29). Retrieved June 5, 2024. Alexa-dns
Sean Metcalf. (2019, May 9). Sean Metcalf Twitter. Retrieved September 12, 2024. Sean Metcalf Twitter DNS Records
SecurityTrails. (2018, March 14). Wrong Bind Configuration Exposes the Complete List of Russian TLD's to the Internet. Retrieved June 5, 2024. Trails-DNS