An adversary engages in active probing and exploration activities to determine security information about a remote target system. Often times adversaries will rely on remote applications that can be probed for system configurations.
Description
Mitigations
2
Consequences
Relationships
Related ATT&CK Techniques
1