System Information Discovery

Description

An adversary may attempt to get detailed information about the operating system and hardware, including version, patches, hotfixes, service packs, and architecture. Adversaries may use the information from System Information Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.

Products, Sensors, and Dependencies

ProductDependenciesData sourceAccess requiredProtocolData CollectedNotes
Tenable Cloud SecurityIaaSRead-onlyHTTPSCloud Environment variables
Tenable Vulnerability ManagementAdvanced Network ScanWindows machinesAuthenticated ScanSMBEnvironment VariablesPlugin ID: 92364

References

Microsoft Windows Environment Variables

Attack Path Technique Details

Framework: MITRE ATT&CK

Family: Discovery

Platform: CLOUD, Windows

Products Required: Tenable Cloud Security

Tenable Release Date: 2024 Q4