An adversary exploits functionality meant to identify information about the services on the target system to an authorized user. By knowing what services are registered on the target system, the adversary can learn about the target environment as a means towards further malicious behavior. Depending on the operating system, commands that can obtain services information include \'sc\' and \'tasklist/svc\' using Tasklist, and \'net start\' using Net.
Description
Mitigations
1
Consequences
Relationships
Related ATT&CK Techniques
1