Discovery consists of techniques that allo …
Discovery consists of techniques that allow the adversary to gain knowledge about the system and internal network. When adversaries gain access to a new system, they must orient themselves to what they now have control of and what benefits operating from that system give to their current objective or overall goals during the intrusion. The operating system provides many native tools that aid in this post-compromise information-gathering phase.st-compromise information-gathering phase. +
"Has query" is a predefined property that represents meta information (in form of a subobject) about individual queries.
This property is a special property in this wiki.
|27 June 2016 18:52:10 +|
"Citation reference" is a predefined property that identifies a citation resource when used as reference (e.g. in-text reference) and is provided by the Semantic Cite extension.
|Windows Commands JPCERT + , Wikipedia Windows Registry + , MSDN System Time + , Technet Windows Time Service + , RSA EU12 They're Inside +|
|hide properties that link here|