Esc
Data from Local System - T1005
(ATT&CK® Technique)
Definition
Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data prior to Exfiltration.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.