| Name | 
    Malware-Directed Internal Reconnaissance | 
  
  
     | 
    
      
        
        
          | Likelyhood of attack | 
          Typical severity | 
         
        
        
        
          | Medium | 
          Medium | 
         
        
       
   | 
  
    | Summary | 
    Adversary uses malware or a similarly controlled application installed inside an organizational perimeter to gather information about the composition, configuration, and security mechanisms of a targeted application, system or network. | 
  
  
    | Prerequisites | 
    The adversary must have internal, logical access to the target network and system. | 
  
  
   | Solutions          | Keep patches up to date by installing weekly or daily if possible. Identify programs that may be used to acquire peripheral information and block them by using a software restriction policy or tools that restrict program execution by using a process allowlist.     |  
  
  
   | Related CAPECS | 
    
      
        
          
            | 
              CAPEC ID
             | 
            
              Description
             | 
           
        
        
        
        
          | CAPEC-169 | 
          An adversary engages in probing and exploration activities to identify constituents and properties of the target. | 
         
        
        
       
     |