EXPLORE
← Back to Explore
T1602.002

Network Device Configuration Dump

Adversaries may access network configuration files to collect sensitive data about the device and the network. The network configuration is a file containing parameters that determine the operation of the device. The device typically stores an in-memory copy of the configuration while operating, and a separate configuration on non-volatile storage to load after device reset. Adversaries can inspect the configuration files to reveal information about the target network and its layout, the network...

Network Devices
1
Detections
1
Sources
1
Threat Actors

BY SOURCE

1elastic

PROCEDURES (1)

Network Connection Monitoring1 detections

Auto-extracted: 1 detections for network connection monitoring

THREAT ACTORS (1)

DETECTIONS (1)