T1010: Application Window Discovery

Adversaries may attempt to get a listing of open application windows. Window listings could convey information about how the system is used or give context to information collected by a keylogger.

Example

With Tasklist we can view the running applications and try to get information on how the Workstation is utilized for enumeration and see if it’s a potential target for Exploitation or other techniques.

Key loggers can be used as well to grab information on what the user is working on and see if this info is valuable.

Last updated