Process Discovery
- ID :
T1057
- Tactic :
Discovery
- Platforms:
Windows
,linux
,macos
Process Discovery
Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network. Adversaries may use the information from Process Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
Exploitations
Windows
Command Prompt
We can get the list of a running processes
in windows by executing this command in command prompt.
1
2
3
tasklist
Powershell
We can get the list of a running processes
in windows by executing this command in powershell.
1
2
3
get-process
Linux
We can get the list of a running processes
in linux by executing the below command.
1
2
3
ps aux