Record summary
A quick snapshot of what this page covers.
Tactic overview
What attackers may be trying to achieve.
The adversary is trying to figure out your AI environment.
Discovery consists of techniques an adversary may use to gain knowledge about the system and internal network. These techniques help adversaries observe the environment and orient themselves before deciding how to act. They also allow adversaries to explore what they can control and what's around their entry point in order to discover how it could benefit their current objective. Native operating system tools are often used toward this post-compromise information-gathering objective.
- ATLAS ID
- AML.TA0008
- ATT&CK external ID
- TA0007
- Technique count
- 9
Technique coverage
Attack methods grouped under this attacker goal.
AML.T0075 - Cloud Service Discovery
AML.T0084 - Discover AI Agent Configuration
AML.T0007 - Discover AI Artifacts
AML.T0014 - Discover AI Model Family
AML.T0013 - Discover AI Model Ontology
AML.T0063 - Discover AI Model Outputs
AML.T0062 - Discover LLM Hallucinations
AML.T0069 - Discover LLM System Information
AML.T0089 - Process Discovery
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.