Free
Search Open Technical Databases: Scan Databases
This course covers various aspects of the Search Open Technical Databases: Scan Databases TTP, including its components, associated risks, and detection techniques. Participants will learn how to detect and mitigate the risks associated with this TTP (T1596.005) and techniques for validating alerts and conducting pre and post-alert preparations.
1
H
35
M
Time
intermediate
difficulty
2
ceu/cpe
Course Content
Attack, Detect and Mitigate
What is Technique T1596.005?
Campaign Overview
Introduction
Shodan Tool
What is Technique T1596.005?
Course Description
This course will cover the technique:
> [T1596.005](https://attack.mitre.org/techniques/T1596/005/): Search Open Technical Databases: Scan Databases is a technique threat actors use to search open technical databases for vulnerabilities or sensitive information. These databases can include online repositories, public code-sharing platforms, and other online resources software developers, system administrators, and other technical users use.> Using automated tools or scripts, attackers can search these databases for misconfigurations, vulnerabilities, or other weaknesses that can be exploited to gain unauthorized access to systems or data. This can include searching for default passwords, known vulnerabilities, or other configuration errors that can be leveraged to gain access to sensitive information.
> Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary's MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.