Discovery
Discovery consists of techniques attackers may use to gain knowledge about the service. These techniques help attackers observe the environment and orient themselves before deciding how to act.
| ID | Name |
|---|---|
| MS-T820 | Storage service discovery |
| MS-T835 | Account configuration discovery |