File and Directory Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system. Adversaries may use the information from [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. Many command shell utilities can be used to obtain this information. Exa...
BY SOURCE
PROCEDURES (27)
Auto-extracted: 6 detections for process creation monitoring
Auto-extracted: 6 detections for privilege
Auto-extracted: 4 detections for general monitoring
Auto-extracted: 3 detections for privilege
Auto-extracted: 3 detections for exfiltrat
Auto-extracted: 2 detections for suspicious
Auto-extracted: 2 detections for script execution monitoring
Auto-extracted: 2 detections for container
Auto-extracted: 2 detections for inject
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for aws
Auto-extracted: 1 detections for ransomware
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for http
Auto-extracted: 1 detections for cloud
Auto-extracted: 1 detections for http
Auto-extracted: 1 detections for network connection monitoring
Auto-extracted: 1 detections for cloud
Auto-extracted: 1 detections for ransomware
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for kernel
Auto-extracted: 1 detections for kernel
Auto-extracted: 1 detections for kubernetes
Auto-extracted: 1 detections for kubernetes