Analyze data collected

From pre-attack
Jump to: navigation, search


Analyze data collected
Technique
ID PRE-T1064
Tactic Technical Weakness Identification

Definition

An adversary will assess collected information such as software/hardware versions, vulnerabilities, patch level, etc. They will analyze technical scanning results to identify weaknesses in the confirmation or architecture.1234

Difficulty for the Adversary

Easy for the Adversary (Yes/No): Yes

Explanation: Many of the common tools highlight these weaknesses automatically. Adversary can "dry run" against the target using known exploits or burner devices to determine key identifiers of software, hardware, and services.

Detection

Detectable by Common Defenses (Yes/No/Partial): No

Explanation: This can be done offline after the data has been collected.