An adversary engages in fingerprinting activities to determine the type or version of an application installed on a remote target.
Description
Consequences
Relationships
Related ATT&CK Techniques
1
An adversary engages in fingerprinting activities to determine the type or version of an application installed on a remote target.