Adversaries may attempt to get information about running processes on a system. Information obtained could be used to gain an understanding of common software/applications running on systems within the network. Adversaries may use the information from [Process Discovery](https://attack.mitre.org/techniques/T1057) during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.In Windows environments, adversaries could obtain details on running processes using the Tasklist utility via cmd or
Get-Process
via PowerShell. Information about processes can also be extracted from the output of Native API calls such asCreateToolhelp32Snapshot
. In Mac and Linux, this is accomplished with theps
command. Adversaries may also opt to enumerate processes via /proc.
Utilize ps to identify processes.
Upon successful execution, sh will execute ps and output to /tmp/loot.txt.
Supported Platforms: macOS, Linux
Name | Description | Type | Default Value |
---|---|---|---|
output_file | path of output file | path | /tmp/loot.txt |
ps >> #{output_file}
ps aux >> #{output_file}
rm #{output_file}
Utilize tasklist to identify processes.
Upon successful execution, cmd.exe will execute tasklist.exe to list processes. Output will be via stdout.
Supported Platforms: Windows
tasklist