Critical Infrastructure Cybersecurity Framework

System Network Configuration Discovery

Adversaries may look for details about the network configuration and settings.

Description

Adversaries may look for details about the network configuration and settings.

Quick Info

Technique ID
T1016
Tactic
Discovery
Sub-Techniques
2
Mitigations
0

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.