Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network.
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.