System Network Configuration Discovery
Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. Several operating system administration utilities exist that can be used to gather this information. Examples include [Arp](https://attack.mitre.org/software/S0099), [ipconfig](https://attack.mitre.org/software/S0100)/[ifconfig](https://attack.mitre.org/software/S0101), [nbtstat](https://attack.mitre.org/softwar...
BY SOURCE
PROCEDURES (21)
Auto-extracted: 4 detections for process creation monitoring
Auto-extracted: 3 detections for dns
Auto-extracted: 3 detections for general monitoring
Auto-extracted: 3 detections for api
Auto-extracted: 3 detections for unusual
Auto-extracted: 2 detections for child process
Auto-extracted: 2 detections for remote
Auto-extracted: 2 detections for suspicious
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for powershell
Auto-extracted: 1 detections for remote
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for powershell
Auto-extracted: 1 detections for network connection monitoring
Auto-extracted: 1 detections for c2
Auto-extracted: 1 detections for c2
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for service