CAPEC 574 Services Footprinting

Stable Standard Low Risk
Severity Low

Description

An adversary exploits functionality meant to identify information about the services on the target system to an authorized user. By knowing what services are registered on the target system, the adversary can learn about the target environment as a means towards further malicious behavior. Depending on the operating system, commands that can obtain services information include \'sc\' and \'tasklist/svc\' using Tasklist, and \'net start\' using Net.

Mitigations

1

Consequences

Relationships

Related ATT&CK Techniques

1