System Information Discovery

An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture. Adversaries may use the information from System Information Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.

ID: T2044
Sub-techniques:  No sub-techniques
Tactic: Discovery
Version: 1.0
Created: 03 December 2023
Last Modified: 03 December 2023
ATT&CK Reference:  T1082

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.