Skip to content

Latest commit

 

History

History
30 lines (27 loc) · 1.49 KB

Discovery.md

File metadata and controls

30 lines (27 loc) · 1.49 KB

Discovery and Enumeration Tools

Tip

  • There are a number of network scanning and profiling tools available online that are designed to help administrators and IT professionals with tasks such as discovering and mapping network devices, performing detailed scans of IP addresses and open ports, and querying network services like Active Directory.

Important

  • Malicious adversaries leverage these network management tools to perform reconnaissance and gather detailed information about a target network.
  • They can use these tools to identify active devices, open ports, and vulnerabilities, which could then be exploited to gain entry.
  • Additionally, querying tools for active directory services could allow them to harvest sensitive information about users, groups, and permissions, facilitating targeted attacks or insider threats.
  • Essentially, these tools, while valuable for legitimate network management, can be misused to map out and exploit network infrastructures for nefarious purposes.
Tool Name Threat Group Usage
Acunetix EMBER BEAR
Amass EMBER BEAR
AADInternals COZY BEAR
AdFind COZY BEAR
Adminer EMBER BEAR
Angry IP Scanner BERSERK BEAR
Bloodhound COZY BEAR, EMBER BEAR
Droopescan EMBER BEAR
DSInternals COZY BEAR
JoomScan EMBER BEAR
LdapDomainDump EMBER BEAR
NBTScan Turla
Nmap EMBER BEAR
Masscan EMBER BEAR
RoadTools COZY BEAR
SScan Turla
WPScan EMBER BEAR