T1010: Application Window Discovery
Last updated
Last updated
Adversaries may attempt to get a listing of open application windows. Window listings could convey information about how the system is used or give context to information collected by a keylogger.
Example
With Tasklist we can view the running applications and try to get information on how the Workstation is utilized for enumeration and see if itβs a potential target for Exploitation or other techniques.
Key loggers can be used as well to grab information on what the user is working on and see if this info is valuable.