Data from Local System
Type: technique
Description: Adversaries may search local system sources, such as file systems and configuration files or local databases, to find files of interest and sensitive data prior to Exfiltration.
This can include basic fingerprinting information and sensitive data such as ssh keys.
Version: 0.1.0
Created At: 2025-03-04 10:27:40 -0500
Last Modified At: 2025-03-04 10:27:40 -0500
External References
Related Objects
- --> Collection (tactic): Collecting data directly from the local system to analyze or use for adversarial purposes.