System Network Connections Discovery
Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network. An adversary who gains access to a system that is part of a cloud-based environment may map out Virtual Private Clouds or Virtual Networks in order to determine what systems and services are connected. The actions performed are likely the same types of discovery techniques depending on the operating s...
BY SOURCE
PROCEDURES (13)
Auto-extracted: 3 detections for lateral
Auto-extracted: 2 detections for process creation monitoring
Auto-extracted: 2 detections for remote
Auto-extracted: 2 detections for service
Auto-extracted: 2 detections for remote
Auto-extracted: 2 detections for suspicious
Auto-extracted: 2 detections for powershell
Auto-extracted: 1 detections for exfiltrat
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for network connection monitoring