System Service Discovery

Adversaries may try to gather information about registered local system services. Adversaries may obtain information about services using tools as well as OS utility commands.Adversaries may use the information from System Service Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions. [1]

ID: T1007
Sub-techniques:  No sub-techniques
Tactic: Discovery
Platforms: Ground Segment, Space Segment
Version: 2.0
Created: 23 September 2022
Last Modified: 05 February 2025

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

References