Windows Discovery Techniques
Description
Monitors for behaviors associated with adversaries discovering objects in the environment that can be leveraged in the progression of the attack.
- Product: Splunk Behavioral Analytics, Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
- Datamodel: Endpoint
- Last Updated: 2021-03-04
- Author: Michael Hart, Splunk
- ID: f7aba570-7d59-11eb-825e-acde48001122
Narrative
Attackers may not have much if any insight into their target’s environment before the initial compromise. Once a foothold has been established, attackers will start enumerating objects in the environment (accounts, services, network shares, etc.) that can be used to achieve their objectives. This Analytic Story provides searches to help identify activities consistent with adversaries gaining knowledge of compromised Windows environments.
Detections
Name | Technique | Type |
---|---|---|
Net Localgroup Discovery | Permission Groups Discovery, Local Groups | Hunting |
Reference
- https://attack.mitre.org/tactics/TA0007/
- https://cyberd.us/penetration-testing
- https://attack.mitre.org/software/S0521/
source | version: 1