Search Open Technical Databases: Scan Databases

This course covers various aspects of the Search Open Technical Databases: Scan Databases TTP, including its components, associated risks, and detection techniques. Participants will learn how to detect and mitigate the risks associated with this TTP (T1596.005) and techniques for validating alerts and conducting pre and post-alert preparations.

Course Content

Shodan Tool


What is Technique T1596.005?
Attack, Detect and Mitigate


What is Technique T1596.005?
Course Description

This course will cover the technique:

> [T1596.005]( Search Open Technical Databases: Scan Databases is a technique threat actors use to search open technical databases for vulnerabilities or sensitive information. These databases can include online repositories, public code-sharing platforms, and other online resources software developers, system administrators, and other technical users use.

> Using automated tools or scripts, attackers can search these databases for misconfigurations, vulnerabilities, or other weaknesses that can be exploited to gain unauthorized access to systems or data. This can include searching for default passwords, known vulnerabilities, or other configuration errors that can be leveraged to gain access to sensitive information.

> Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary's MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.

This course is part of a Career Path:
No items found.

Instructed by

Owen Dubiel

Owen is certified in the GIAC GSEC, CompTIA CySA+, and various other vendor-related certifications. He works both as a technical security engineer and as an SME architect instructor in his spare time. Spreading the word of cyber security is a passion of his. Owen lives in Southeast Michigan with his beautiful wife, daughter, and his dog, Thor. In his free time, Owen enjoys watching sports and movies, and spending time with his family.

Lucas Romano

Lucas is a seasoned threat researcher in multiple security disciplines, such as real-world adversarial tracking, network vulnerabilities, web exploitation, API abuse, and more. He began his career at the US Department of Defense, where he was trained by some of the world's best operators and analysts. Lucas now operates in the Cybrary red team, emulating real-world threat actors and running purple team exercises. He has 11 industry certifications, including the OSWA, GPEN, GAWN, GCFE, and RHCSA. He is also a member of the GIAC Advisory Board. In his free time, he enjoys working outdoors to improve his farm.

Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Search Open Technical Databases: Scan Databases Certificate of Completion