Esc
System Network Configuration Discovery - T1016
(ATT&CK® Technique)
Definition
Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. Several operating system administration utilities exist that can be used to gather this information. Examples include Arp, ipconfig/ifconfig, nbtstat, and route.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.