Search Open Technical Databases: Scan Databases

Course Content
This course will cover the technique:
> [T1596.005](https://attack.mitre.org/techniques/T1596/005/): Search Open Technical Databases: Scan Databases is a technique threat actors use to search open technical databases for vulnerabilities or sensitive information. These databases can include online repositories, public code-sharing platforms, and other online resources software developers, system administrators, and other technical users use.> Using automated tools or scripts, attackers can search these databases for misconfigurations, vulnerabilities, or other weaknesses that can be exploited to gain unauthorized access to systems or data. This can include searching for default passwords, known vulnerabilities, or other configuration errors that can be leveraged to gain access to sensitive information.
> Learn how to detect and mitigate these techniques to protect your organization from this type of attack. Apply what you learn and get the hands-on skills you need in Cybrary's MITRE ATT&CK Framework courses aligned to tactics and techniques used by threat actors.