An adversary exploits functionality meant to identify information about the domain accounts and their permissions on the target system to an authorized user. By knowing what accounts are registered on the target system, the adversary can inform further and more targeted malicious behavior. Example Windows commands which can acquire this information are: \'net user\' and \'dsquery\'.
Description
Mitigations
1
Consequences
Relationships
Related ATT&CK Techniques
1