When people talk about cyber-attacks, they usually jump straight to malware, exploits, or ransomware. In real intrusions, however, attackers don't start by breaking things. They start by observing. Reconnaissance is the phase where adversaries quietly learn how your environment works, who matters, what's exposed, and where the soft edges are. If you miss recon, you almost always miss the chance to stop the attack early.
Reconnaissance in MITRE ATT&CK (TA0043) is often misunderstood because it doesn't always look malicious. In fact, good reconnaissance deliberately blends into normal activity. Attackers behave like curious administrators, not like noisy hackers. That is exactly why recon is so dangerous and so difficult to detect.
Reconnaissance Is Not Discovery (And Confusing Them Hurts Detection)
One of the most common mistakes defenders make is treating Reconnaissance and Discovery as the same thing. They are not.
Reconnaissance is about learning the attack surface. Discovery is about understanding the internal environment after access. The difference matters because recon frequently happens before exploitation or immediately after initial access, while discovery tends to occur later, once attackers already have confidence and privileges.
Attackers rarely stop recon once they gain access. Instead, recon becomes a loop. Every successful step triggers another round of enumeration. New credentials lead to new visibility. New access leads to deeper mapping. If defenders only look for recon outside the environment, they miss the internal reconnaissance that precedes lateral movement and privilege escalation.
What Attackers Are Actually Trying to Learn
Reconnaissance is not random scanning. It is goal-driven intelligence collection. In practical terms, attackers are answering a small set of questions:
- Which identities exist and which ones matter?
- What infrastructure is reachable and how is it segmented?
- Which services are exposed and how are they authenticated?
- What security controls are in place and how mature are they?
Identity is the highest-value recon target in modern environments. User naming patterns, admin roles, MFA enforcement, service accounts, and privilege boundaries tell attackers more than any open port ever could. In cloud and hybrid environments, identity reconnaissance often matters more than network reconnaissance.
External Reconnaissance: What You'll Never See in Your SIEM
Most recon happens long before logs exist.
Passive reconnaissance relies on information that organizations have already leaked, often unintentionally. DNS records, certificate transparency logs, GitHub repositories, job postings, breached credential dumps, and public cloud metadata provide attackers with a surprising amount of insight. None of this generates alerts because it never touches your environment.
Active external reconnaissance is louder but still difficult to attribute. Port scanning, DNS brute forcing, web crawling, and API probing generate logs, but they often look like background internet noise. Mature attackers tune their activity to stay below common thresholds, spreading scans across time, IP space, and tooling to avoid detection.
The uncomfortable truth is that external recon is mostly a prevention problem, not a detection problem. Asset hygiene, exposure management, and least-privilege design matter more than alerts here.
Internal Reconnaissance: Where Detection Actually Works
Internal reconnaissance is where defenders have leverage.
Once attackers gain a foothold, they need to understand the environment quickly. They enumerate users, groups, domain controllers, file shares, services, and cloud resources. This phase is time-sensitive for attackers and often happens in bursts. The faster they learn, the faster they can escalate privileges or move laterally.
What makes internal recon dangerous is that it is usually performed using legitimate credentials and native tools. There are no exploits, no malware, and often no failures. From a logging perspective, everything "works as designed".
Living-off-the-Land Recon: Native Tools, Native Noise
Experienced attackers avoid custom binaries during recon. Instead, they rely on tools that are already present:
- Windows utilities like net, nltest, dsquery, whoami, and sc
- PowerShell cmdlets for Active Directory and local system inspection
- LDAP queries that read user, group, and computer objects
- Cloud APIs that list subscriptions, resources, and role assignments
Individually, these commands are benign. Administrators run them every day. The signal comes from patterns, not from single executions. A standard user enumerating hundreds of AD objects, querying multiple domain controllers, and scanning file shares within minutes is not performing routine work, even if every command succeeds.
LDAP and Directory Recon: Silent and Powerful
Directory services are a goldmine for attackers. LDAP allows read access to an enormous amount of information by default. Group memberships, service principal names, delegation settings, and trust relationships can all be enumerated without triggering authentication failures.
Tools like BloodHound have made directory reconnaissance faster and more structured, but even without them, attackers can manually query the same data. From a defender's perspective, this is one of the hardest areas to monitor because directory reads are expected behavior. The key is identifying volume, velocity, and source anomalies, especially from non-admin accounts or non-administrative systems.
Cloud Reconnaissance: API-Driven and Often Ignored
In cloud environments, reconnaissance looks very different. There are no port scans. There is no ARP table. Everything happens through APIs.
Attackers enumerate subscriptions, resource groups, virtual machines, managed identities, storage accounts, and key vaults using legitimate access tokens. This activity is fast, scalable, and quiet. Many organizations log cloud control-plane activity but rarely analyze it for reconnaissance behavior.
One of the strongest cloud recon signals is read-heavy activity without corresponding deployment or management actions. An identity that lists everything but changes nothing is learning, not operating.
How Reconnaissance Actually Shows Up in Logs
Recon is rarely a single event. It is a sequence.
Common patterns include:
- Multiple enumeration commands executed within a short time window
- High object counts from read-only directory or API queries
- Recon activity originating from user endpoints instead of admin workstations
- Identity enumeration followed by authentication attempts
- Infrastructure mapping followed by lateral connection attempts
High-fidelity detection comes from correlating these behaviors across log sources, not from isolated alerts.
Why Reconnaissance Is Where Defenders Win or Lose
If you detect exploitation, you're already late. If you detect lateral movement, damage is likely underway. Reconnaissance is the last phase where attackers are still thinking, planning, and adjusting. It is also the phase where they are most exposed behaviorally, even if they are technically quiet.
Organizations that take recon seriously don't just write alerts. They design environments where reconnaissance is harder, slower, and more obvious. They minimize directory overexposure, restrict cloud read permissions, segment administrative access, and monitor identity behavior with context.
Final Thoughts
Reconnaissance is the attacker's internal monologue. It reveals intent before impact. Most breaches are not sophisticated because of zero-days or custom malware. They succeed because reconnaissance went unnoticed, unchallenged, and uninterrupted.
If you want to stop real-world attacks early, don't start with ransomware detections. Start by listening for curiosity in the wrong places.