CAPEC 575 Account Footprinting

Stable Standard Low Risk
Severity Low

Description

An adversary exploits functionality meant to identify information about the domain accounts and their permissions on the target system to an authorized user. By knowing what accounts are registered on the target system, the adversary can inform further and more targeted malicious behavior. Example Windows commands which can acquire this information are: \'net user\' and \'dsquery\'.

Mitigations

1

Consequences

Relationships

Related ATT&CK Techniques

1