Discovery
Discovery consists of techniques attackers may use to gain knowledge about the service. These techniques help attackers observe the environment and orient themselves before deciding how to act.
ID | Name |
---|---|
MS-T820 | Storage service discovery |
MS-T835 | Account configuration discovery |