Gather Victim Network Information is the process of collecting data about a target's network infrastructure, like IP ranges, domain names, and service details, to plan and enable further attacks.
ATT&CK ID T1590
Tactics Reconnaissance
Platforms PRE
Difficulty 🟢 Low
Prevalence High
Imagine you're planning to rob a bank. You wouldn't just walk in blind. First, you'd case the joint: note the security cameras, count the guards, map the exits, and observe cash delivery schedules. Gather Victim Network Information is the digital equivalent of this reconnaissance phase.
Attackers are performing digital "drive-bys" of your organization. They use public tools and data to passively and actively probe your external digital footprint. The goal isn't to break in yet, but to draw a detailed map of your network's borders, weak points, and valuable assets. This map makes their eventual attack faster, quieter, and more likely to succeed.
| Term | Simple Definition |
|---|---|
| ASN (Autonomous System Number) | A unique identifier for a network or group of IP addresses controlled by a single organization (e.g., an ISP or large company). Think of it as a postal code for a chunk of the internet. |
| DNS Reconnaissance | The process of querying Domain Name System (DNS) records to discover subdomains, mail servers, and other network hosts associated with a target domain. |
| IP Block / Netblock | A contiguous range of IP addresses assigned to an organization. Finding this tells an attacker the "neighborhood" of your digital assets. |
| Passive Reconnaissance | Collecting information without directly interacting with the target's systems (e.g., using search engines, public databases). It's silent and often undetectable. |
| Banner Grabbing | Connecting to a network service (like a web or mail server) to read its welcome message, which often reveals software names and versions. |
A structured approach to Gather Victim Network Information often follows this path:
Think like a burglar researching a neighborhood from public records and a few daytime walks. You're looking for answers to key questions: Which houses have alarm company signs? Who has a tall, climbable fence? Which driveway has the expensive car? In the digital world, the Red Team asks: What's their public IP range? Where is their email hosted? Do they have any exposed development or test servers (often less secure)? This mindset is about patiently building a profile from scattered, public clues.
Attackers have a vast, often free, toolkit for this phase.
Example Command Snippets:
# Using nslookup to find mail servers (MX records) for a domain
nslookup -type=MX example.com
# Using nmap for a light, "stealthy" ping sweep of a discovered netblock
nmap -sn 203.0.113.0/24 -oG ping_sweep.txt
# Using dnsrecon for a standard enumeration
dnsrecon -d example.com -t std -j dns_results.json
The APT29 group (also known as Cozy Bear or Midnight Blizzard), associated with Russian intelligence, is known for conducting extensive and patient reconnaissance. Prior to their compromise of the SolarWinds build environment in the SUNSPOT campaign, they undoubtedly performed deep Gather Victim Network Information operations. This would have included mapping SolarWinds' external network, understanding its software supply chain partners, and identifying key development and update infrastructure to surgically insert their malicious code.
For a detailed analysis, see the CrowdStrike report on SUNSPOT: SUNSPOT Malware Analysis.
Your job is to be the neighborhood watch that notices the suspicious car driving slowly down the street every day. You can't stop someone from looking at your house from the public street, but you can notice if they're taking pictures, testing the gate, or casing multiple houses in a pattern. The Blue Team philosophy here is awareness and attribution. We must assume reconnaissance is happening constantly. The goal is to detect it, understand the adversary's focus, and use that intelligence to strengthen our defenses before they strike.
Pure passive recon is invisible. The moment an attacker switches to active scanning, they generate logs. The challenge is separating malicious scanning from legitimate security tools, researchers, and benign internet background noise.
Here is a Sigma rule to detect potential DNS reconnaissance tools (like dnsrecon) making high-volume TXT or AXFR record queries, which are uncommon in normal user traffic.
title: High Volume of DNS TXT or AXFR Queries
id: a1b2c3d4-1234-5678-abcd-ef1234567890
status: experimental
description: Detects a source IP making an unusually high number of DNS TXT or AXFR queries, which can indicate reconnaissance activity.
references:
- https://attack.mitre.org/techniques/T1590/
author: Your SOC
date: 2023-10-27
logsource:
category: dns
detection:
selection:
query_type:
- 'TXT'
- 'AXFR'
condition: selection | count() by src_ip > 25
falsepositives:
- Legitimate security assessment tools
- Misconfigured internal systems
level: medium
tags:
- attack.t1590
- attack.reconnaissance
Since you can't hide all public information, focus on reducing its usefulness to an attacker.
| Attacker's Goal (Red) | Defender's Action (Blue) |
|---|---|
| Discover all public IP blocks and domains. | Maintain an accurate, minimal inventory of public assets; remove orphaned IPs. |
| Enumerate all subdomains to find hidden or test systems. | Practice strict DNS hygiene; use generic names for public services; monitor for anomalous DNS query patterns. |
| Fingerprint software versions to find known vulnerabilities. | Obfuscate banners; maintain a rigorous patch management program for all public-facing software. |
| Map network trust relationships from exposed data. | Implement strong network segmentation; assume discovered hosts will be targeted. |
A single external IP address making sequential DNS queries for hundreds of potential subdomains (`a1.company.com`, `a2.company.com`, ...) or conducting a TCP port scan across your entire public IP range within minutes.
Conduct monthly OSINT self-assessments. Use the same free tools attackers use to find and secure forgotten assets. Implement and tune DNS query logging and rate limiting.
Your DNS server logs (look for spikes in TXT, AXFR, or ANY record queries) and firewall deny logs (for connection attempts to non-existent hosts across your IP block).
• Official MITRE ATT&CK Page: T1590 - Gather Victim Network Information
• External Deep Dive: SANS Blog on OSINT Fundamentals
Gather Victim Network Information is the foundational, often overlooked, first chapter of any major cyber attack. Defenders must shift their mindset: assume it's happening to your organization right now. Your goal is not to prevent all information leakage, that's impossible, but to manage your digital footprint, detect active probing, and use that early warning to fortify your defenses.
Your Action Plan:
Continue Your Learning:
Remember, in cybersecurity, the battle often begins long before the first malware is dropped. By mastering the reconnaissance phase, you build a stronger, more aware defensive posture from the ground up.
Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.
Choose the amount of donation by yourself.