CAPEC-575: Account Footprinting

An adversary exploits functionality meant to identify information about the domain accounts and their permissions on the target system to an authorized user. By knowing what accounts are registered on the target system, the adversary can inform further and more targeted malicious behavior. Example Windows commands which can acquire this information are: "net user" and "dsquery".

Severity
Low
Likelihood
Low
14
/ 100
low-risk
Active Threat 12/50 · Low
Exploit Availability 2/50 · Minimal