Record summary
A quick snapshot of what this page covers.
ATT&CK object
The broader cybersecurity technique connected to these AI records.
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Adversaries may do this using a Command and Scripting Interpreter, such as cmd as well as a Network Device CLI, which have functionality to interact with the file system to gather information.(Citation: show_run_config_cmd_cisco) Adversaries may also use Automated Collection on the local system.
- ATT&CK ID
- T1005
- STIX ID
- attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5
- Name
- Data from Local System
- Connected AI records
- 1
Connected AI records
AI security records connected to this cybersecurity technique.
AML.T0037 - Data from Local System
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.