Terms
Alphabetical index of published term entries with tag filters and quick sort.
- Updated Jan 03, 2026
Adversaries may gather information about the victim's hosts that can be used during targeting. Information about hosts may include a variety of details, including administrative data (ex: name, assigned IP, functionality, etc.) as well as specifics regarding its configuration (ex: operating system, language, etc.).