An adversary exploits functionality meant to identify information about the currently running processes on the target system to an authorized user. By knowing what processes are running on the target system, the adversary can learn about the target environment as a means towards further malicious behavior.
Description
Mitigations
1
Consequences
Relationships
Related ATT&CK Techniques
1