Local Account
Adversaries may attempt to get a listing of local system accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior. Commands such as <code>net user</code> and <code>net localgroup</code> of the [Net](https://attack.mitre.org/software/S0039) utility and <code>id</code> and <code>groups</code> on macOS and Linux can list local users and groups.(Citation: Mandiant APT1)(Citation: id man page)(Citation: groups man page) On Linux, l...
BY SOURCE
PROCEDURES (23)
Auto-extracted: 4 detections for process creation monitoring
Auto-extracted: 3 detections for lateral
Auto-extracted: 2 detections for powershell
Auto-extracted: 2 detections for general monitoring
Auto-extracted: 2 detections for wmi
Auto-extracted: 2 detections for script block
Auto-extracted: 1 detections for script block
Auto-extracted: 1 detections for powershell
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for dump
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for file monitoring
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for powershell