Detect processes used for System Network Configuration Discovery
System Network Configuration Discovery
System Network Configuration Discovery
Phishing, Spearphishing Attachment
Exploit Public-Facing Application, External Remote Services
Registry Run Keys / Startup Folder, Boot or Logon Autostart Execution
Disable or Modify Tools, Impair Defenses