Across
- 3. details and settings, including operating system/version, virtualization, architecture (ex: 32 or 64 bit), language, and/or time zone.
- 7. an adversary probes victim infrastructure via network traffic
- 8. Informatiom such as type and versions on specific hosts, which may be used to infer more information about hosts in the environment (ex: configuration, purpose, age/patch level, etc.
- 9. Checks if the configuration of a target host/application (ex: software and version) potentially aligns with the target of a specific exploit the adversary may seek to use.
- 11. employee electronic mail address
- 12. Information such as types and versions on specific hosts, as well as the presence of additional components (ex: antivirus, SIEMs, etc.)
Down
- 1. details, including personal data (ex: employee names, email addresses, etc.)
- 2. Public IP addresses which may be allocated to organizations by block, or a range of sequential addresses
- 4. Physical infrastructure which may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components (ex: card/biometric readers, dedicated encryption hardware, etc.).
- 5. Names used to derive email addresses
- 6. Gathered data that may including administrative data (ex: name, assigned IP, functionality, etc.) as well as specifics regarding its configuration (ex: operating system, language, etc
- 10. Username and password