{'xhtml:p': 'An adversary engages in activities to discover any sensitive constants present within the compiled code of an executable. These constants may include literal ASCII strings within the file itself, or possibly strings hard-coded into particular routines that can be revealed by code refactoring methods including static and dynamic analysis.'}
Description
Consequences
Relationships
Related ATT&CK Techniques
1
Resources Required
1