Home > CAPEC List > CAPEC-575: Account Footprinting (Version 2.11)  

CAPEC-575: Account Footprinting

Account Footprinting
Definition in a New Window Definition in a New Window
Attack Pattern ID: 575
Abstraction: Detailed
Status: Draft
Completeness: Stub
Presentation Filter:
+ Summary

Adversaries may attempt to get a listing of all local or domain accounts and their permissions. Example Windows commands which can acquire this information are: "net user" and "dsquery".

+ Solutions and Mitigations

Identify programs that may be used to acquire account information and block them by using a software restriction policy or tools that restrict program execution by process whitelisting.

+ References
[R.575.1] ATT&CK Project. "Account enumeration (1087)". MITRE. <https://attack.mitre.org/wiki/Account_enumeration>.
+ Content History
CAPEC Content TeamThe MITRE Corporation2015-11-09Internal_CAPEC_Team

More information is available — Please select a different filter.
Page Last Updated or Reviewed: August 04, 2017