Adversaries systematically map your network infrastructure before striking. Every domain, DNS record, IP range, and trust relationship is a piece of the puzzle that enables precision attacks.
T1590 is the overarching reconnaissance technique within MITRE ATT&CK's TA0043 (Reconnaissance) tactic that covers all aspects of target network discovery. It encompasses six sub-techniques—from domain property enumeration and DNS record harvesting to IP range mapping, trust dependency analysis, network topology mapping, and security appliance identification. Adversaries ranging from opportunistic script kiddies to sophisticated nation-state APT groups rely on T1590 as the critical first phase of their kill chain. The intelligence gathered here directly informs which vulnerabilities to exploit, which entry points to target, and how to navigate the network once initial access is achieved. Without robust network exposure management, organizations are essentially handing adversaries a detailed blueprint of their infrastructure.
CISA has issued multiple alerts on DNS infrastructure hijacking campaigns (Advisory AA19-024A), emphasizing that adversary reconnaissance of DNS infrastructure remains a persistent and evolving threat. Organizations that fail to minimize their network intelligence exposure provide adversaries with reconnaissance data that can be gathered passively, without triggering any security alerts, enabling months of silent preparation before a single malicious packet is sent to the target network.
Gather Victim Network Information (T1590) is a MITRE ATT&CK reconnaissance technique where adversaries systematically collect details about a target organization's network infrastructure. This encompasses domain registrations, DNS configurations, IP address allocations, network trust relationships, topological layout, and security appliance deployment. This intelligence forms the foundation for all subsequent attack planning, enabling threat actors to identify exploitable entry points, map internal network dependencies, and craft highly targeted intrusion strategies that maximize their probability of success while minimizing detection risk.
Imagine a military scout mapping an enemy's territory before any engagement. They photograph every building, map every road, identify guard posts, discover which buildings are connected by tunnels, and learn which territories are allied. The complete map they build reveals every weakness, every entry point, and every high-value target. That's exactly what T1590 provides for cyber attackers. Through passive observation of publicly available information—DNS records, WHOIS data, BGP routing tables, certificate transparency logs—an adversary constructs a comprehensive map of your network without ever touching a single system inside your perimeter.
The process of discovering DNS records (A, AAAA, MX, NS, TXT, SRV, CNAME) associated with a target domain. Adversaries use this to identify mail servers, name servers, subdomains, and service discovery records that reveal the target's network architecture and technology stack.
Network relationships between organizations, including federated authentication, VPN tunnels, API integrations, and shared cloud infrastructure. Adversaries exploit these trust boundaries to pivot from a less-secured partner network into the primary target.
Discovery of the logical and physical arrangement of network components—routers, switches, firewalls, DMZs, VLANs, and cloud regions. Through traceroute, BGP data, and passive DNS analysis, adversaries build complete infrastructure maps.
TransGlobal's network infrastructure was fully discoverable through passive reconnaissance. Public WHOIS records exposed administrative contacts and network blocks. Unsecured DNS zone transfers (AXFR) allowed complete domain enumeration. No BGP route filtering meant their AS number and IP allocations were trivially mapped. Most critically, the company maintained interconnected networks with 40+ logistics partners—none segmented properly. A nation-state APT group mapped their entire network topology in under 72 hours using only publicly available sources. They discovered a legacy VPN link to a partner network with weak authentication and no MFA. The threat actors used this as initial access, spreading across 3 countries through lateral movement. The breach compromised shipping manifests for over 50,000 containers, disrupted operations for 18 days, and triggered $12 million in regulatory penalties and remediation costs.
$12M in damages • 50,000+ records breachedDaniel led a comprehensive network exposure reduction initiative. He implemented DNSSEC across all domains to prevent DNS spoofing and cache poisoning. Zone transfers were restricted to authorized secondary servers only. Network segmentation was redesigned with micro-segmentation policies isolating partner connections into dedicated DMZs with strict egress filtering. Zero-trust partnership agreements were established, requiring mutual authentication for all inter-organization links. BGP security was hardened with RPKI (Resource Public Key Infrastructure) to prevent route hijacking. Continuous network exposure monitoring was deployed using passive DNS sensors and certificate transparency log watchers. Within the first month of deployment, the team detected and attributed three separate reconnaissance campaigns from distinct threat actors. Their network intelligence exposure was reduced by 88%, and they established a 4-hour detection-to-response SLA for any new infrastructure discovery attempts.
88% exposure reduction • 3 campaigns detected in month 1Follow this structured approach to systematically reduce your organization's network intelligence exposure and close the reconnaissance gaps that adversaries exploit during the T1590 phase of their attack lifecycle.
Begin by conducting a comprehensive audit of all externally accessible network infrastructure. Document every public IP block, every domain and subdomain, every DNS record, and every externally facing service. Use passive reconnaissance tools (Shodan, Censys, SecurityTrails) to discover what adversaries can see about your organization. Create an inventory of all cloud assets across AWS, Azure, and GCP, including forgotten development and staging environments. This baseline is essential for measuring improvement and identifying blind spots in your infrastructure visibility.
Deploy DNSSEC on all authoritative zones to prevent DNS spoofing attacks. Disable AXFR zone transfers or restrict them to authenticated secondary name servers only. Remove unnecessary TXT, SRV, and HINFO records that leak server information. Implement DNS query logging and anomaly detection to identify reconnaissance patterns. Consider using managed DNS providers with built-in DDoS protection and query analytics. Regularly audit your DNS records for stale entries that expose deprecated infrastructure or reveal internal naming conventions that could aid attacker reconnaissance.
Design and enforce network segmentation that limits what an adversary can discover and access even after gaining initial access. Separate partner networks into isolated DMZs with strict access controls. Implement micro-segmentation within your internal network so that compromising one segment does not expose others. Deploy next-generation firewalls with application-layer inspection between segments. Ensure cloud environments use VPCs, security groups, and network ACLs to enforce isolation. Document all segmentation policies and regularly test them through segmentation verification exercises.
Identify every third-party organization with network connectivity to your infrastructure—VPN tunnels, API integrations, shared cloud environments, federated authentication providers, and supply chain partners. For each trust relationship, verify that the principle of least privilege is enforced. Implement mutual authentication (mTLS) for all API connections. Deploy monitoring on all inter-organization links. Establish security requirements for partners and conduct regular assessments of partner security posture. Remember: adversaries exploit your trust relationships because they know these paths are often less secured than your primary perimeter.
Minimize public exposure of your IP address space. Use WHOIS privacy services to protect registration details. Implement RPKI for BGP security to prevent route hijacking and unauthorized announcement of your IP ranges. Consider using CDN and DDoS protection services that mask your origin IP addresses behind proxy infrastructure. Regularly scan for leaked IP addresses in threat intelligence feeds, paste sites, and public vulnerability databases. Implement IP reputation monitoring to detect if your addresses appear in botnet or spam lists, which could indicate compromise or misuse by threat actors.
Prevent adversaries from discovering your defensive capabilities by obscuring security appliance fingerprints. Disable banner grabbing on firewalls, IDS/IPS, and load balancers. Use generic responses that don't reveal vendor and version information. Ensure management interfaces are not accessible from the public internet. Deploy deception technology (honeypots, honeytokens) to create false infrastructure that misleads reconnaissance efforts. Keep all security appliance firmware updated and patched. Monitor for vulnerability scanners targeting your security appliances, as this often indicates active reconnaissance of your defensive posture.
Establish 24/7 monitoring of your external network attack surface using automated tools that alert on changes in DNS records, certificate deployments, port exposure, and cloud asset configurations. Integrate threat intelligence feeds that correlate your infrastructure indicators with known adversary reconnaissance activities. Deploy passive DNS monitoring to detect domain name changes or new subdomain creation that could indicate compromise or unauthorized infrastructure. Implement a formal process for responding to newly discovered exposure—assigning ownership, setting remediation SLAs, and tracking closure. Conduct quarterly attack surface assessments and red team exercises to validate your exposure reduction efforts.
The red team views T1590 as the highest-leverage phase of the entire attack lifecycle. Effective network reconnaissance eliminates guesswork, reduces operational risk, and dramatically increases success rates for every subsequent tactic from initial access to exfiltration.
The blue team focuses on minimizing the intelligence available to adversaries while detecting active reconnaissance campaigns through anomaly detection and threat intelligence correlation.
Threat hunting for T1590 focuses on detecting the artifacts and behavioral patterns that indicate active or recent network reconnaissance against your organization. Since much of T1590 activity occurs against third-party services (DNS, WHOIS, certificate logs) rather than your infrastructure directly, effective hunting requires monitoring external data sources and correlating them with internal telemetry. The following detection hypotheses and data sources provide a structured approach to hunting for adversary network reconnaissance campaigns targeting your organization.
Monitor authoritative DNS servers for volumetric query patterns targeting non-existent subdomains (NXDOMAIN floods), unusual record type queries (TXT, SRV, AXFR attempts), and repeated zone transfer requests from unauthenticated sources. Correlate query volumes with threat intelligence to identify known scanning infrastructure.
Continuously monitor certificate transparency logs (crt.sh, Censys Certificates) for new certificates issued containing your domain names, especially wildcard certificates or certificates issued by unknown CAs. New certificate issuance may indicate subdomain takeover attempts or phishing infrastructure preparation.
Monitor BGP routing tables for unauthorized announcements of your AS number or IP address ranges. Use RPKI validation and route collector data (RIPE RIS, BGPstream) to detect route hijacking attempts that could enable traffic interception or reconnaissance of network connectivity patterns.
Monitor partner VPN tunnels, API integrations, and federated authentication logs for unusual authentication patterns, data access attempts, or lateral movement from partner networks. Baseline normal partner traffic patterns and alert on deviations that could indicate an adversary pivoting through a compromised trust relationship.
Monitor perimeter firewalls and IDS/IPS for connection attempts to large numbers of sequential IP addresses or ports from single sources. Track SYN scan patterns, service fingerprinting attempts (banner grabbing, version probes), and vulnerability scanner signatures that indicate systematic infrastructure enumeration.
Automatically monitor paste sites (Pastebin, GitHub Gists), dark web forums, and OSINT aggregation platforms for leaked credentials, network diagrams, configuration files, or internal documentation that could provide adversaries with detailed network intelligence. Set up keyword-based alerts for your domain names, IP ranges, and internal service names.
T1590 encompasses six distinct sub-techniques, each targeting a specific category of network intelligence. Explore each sub-technique to understand the adversary's methodology and build targeted defenses for every aspect of your network exposure.
Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.
Choose the amount of donation by yourself.