EXPLORE
← Back to Explore
T1518.002

Backup Software Discovery

Adversaries may attempt to get a listing of backup software or configurations that are installed on a system. Adversaries may use this information to shape follow-on behaviors, such as [Data Destruction](https://attack.mitre.org/techniques/T1485), [Inhibit System Recovery](https://attack.mitre.org/techniques/T1490), or [Data Encrypted for Impact](https://attack.mitre.org/techniques/T1486). Commands that can be used to obtain security software information are [netsh](https://attack.mitre.org/s...

WindowsmacOSLinux
0
Detections
0
Sources
1
Threat Actors

THREAT ACTORS (1)

DETECTIONS (0)