Detection of Vulnerabilities

Technique Detected:  Vulnerabilities | T1588.006

ID: DET0808
Domains: Enterprise
Analytics: AN1940
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN1940

Much of this activity will take place outside the visibility of the target organization, making detection of this behavior difficult. Detection efforts may be focused on behaviors relating to the potential use of exploits for vulnerabilities (i.e. Exploit Public-Facing Application, Exploitation for Client Execution, Exploitation for Privilege Escalation, Exploitation for Defense Evasion, Exploitation for Credential Access, Exploitation of Remote Services, and Application or System Exploitation).