Reconnaissance techniques
Reconnaissance consists of techniques that involve adversaries actively or passively gathering information that can be used to support targeting. Such
information may include details of the victim organization, infrastructure, or staff/personnel. This information can be leveraged by the adversary to aid in
other phases of the adversary lifecycle, such as using gathered information to plan and execute Initial Access, to scope and prioritize post-compromise
objectives, or to drive and lead further Reconnaissance efforts.
Pick one of the Reconnaissance techniques for your discussion question and describe the technique. What sub-techniques are a part of this technique? How
might this technique be detected and mitigated by cyber defenders?