Reconnaissance

123456789101112
Across
  1. 3. details and settings, including operating system/version, virtualization, architecture (ex: 32 or 64 bit), language, and/or time zone.
  2. 7. an adversary probes victim infrastructure via network traffic
  3. 8. Informatiom such as type and versions on specific hosts, which may be used to infer more information about hosts in the environment (ex: configuration, purpose, age/patch level, etc.
  4. 9. Checks if the configuration of a target host/application (ex: software and version) potentially aligns with the target of a specific exploit the adversary may seek to use.
  5. 11. employee electronic mail address
  6. 12. Information such as types and versions on specific hosts, as well as the presence of additional components (ex: antivirus, SIEMs, etc.)
Down
  1. 1. details, including personal data (ex: employee names, email addresses, etc.)
  2. 2. Public IP addresses which may be allocated to organizations by block, or a range of sequential addresses
  3. 4. Physical infrastructure which may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components (ex: card/biometric readers, dedicated encryption hardware, etc.).
  4. 5. Names used to derive email addresses
  5. 6. Gathered data that may including administrative data (ex: name, assigned IP, functionality, etc.) as well as specifics regarding its configuration (ex: operating system, language, etc
  6. 10. Username and password