Discovery (TA0007)

DDoSPedia An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

Security Research Center

During an operation, threat actors are bound to end up in an unknown environment. They need to carefully survey the environment or system to determine how to proceed. This part of an operation is known as “discovery” and allows threat actors the ability to assess their potential and permissions. In addition to discovering system information, threat actors might employ various techniques used to detect and avoid analysis in environments such as honeypots.

 

DDoSPedia Index

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Radware Blog
Security Research Center