Installed applications
MITRE ATT&CK™ Software Discovery - Technique T1518
Theory
Understanding the compromised machine's characteristics is essential. Enumerating installed applications aids in pinpointing vulnerabilities, obsolete software, and misconfiguration that may be leveraged for privilege escalation.
Practice
Applications retrieved from registries or WMI may not be complete. We should always check 32-bit and 64-bit Program Files directories and content of the Downloads directory of our user to find more potential programs.
We may use following commands and query registries for installed applications
Resources
Last updated