CAPEC-576: Group Permission Footprinting

An adversary exploits functionality meant to identify information about user groups and their permissions on the target system to an authorized user. By knowing what users/permissions are registered on the target system, the adversary can inform further and more targeted malicious behavior. An example Windows command which can list local groups is "net localgroup".

Severity
Low
Likelihood
Low
14
/ 100
low-risk
Active Threat 12/50 · Low
Exploit Availability 2/50 · Minimal