Critical Infrastructure Cybersecurity Framework

Software Discovery

Adversaries may attempt to get a listing of software and software versions that are installed on a system or in a cloud environment.

Description

Adversaries may attempt to get a listing of software and software versions that are installed on a system or in a cloud environment.

Quick Info

Technique ID
T1518
Tactic
Discovery
Sub-Techniques
1
Mitigations
0

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.