The foundational phase of the Identity Attack Chain where adversaries silently map your identity infrastructure
What Happens During Reconnaissance
Reconnaissance is the attacker's information-gathering phase, focused entirely on understanding the identity surface of an organization. This stage does not involve authentication attempts—it is quiet, external, passive, and often invisible unless identity endpoints leak information.
Identity recon is the foundation for everything that follows in the attack chain. Without this intelligence, adversaries cannot effectively target your users, spray credentials, or craft sophisticated phishing campaigns.
Attacker Intelligence Targets
Organizational email patterns
Public UPN formats
Exposed identity endpoints
MFA prompt timing
Cloud tenant identifiers
Federation metadata
OAuth consent flows
Identify Authentication Methods
Map how users authenticate across cloud and on-premises systems
Discover Naming Conventions
Understand email formats and UPN structures for enumeration
Locate Cloud Tenants
Identify tenant IDs, realms, and federation trust relationships
Find Weak Login Surfaces
Detect misconfigured endpoints and information-leaking error messages
Identity endpoints reveal usernames, alias formats, or email patterns through default error messages. Attackers use these verbose responses to validate account existence and build precise target lists.
2
MC-075: Weak Network Segmentation
Identity surfaces including login portals, cloud tenants, and federation metadata are accessible from anywhere without throttling, geographic restrictions, or network segmentation controls.