Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 325

Discovery (MITRE Tactic)

What is Discovery (MITRE Tactic)?

Discovery (MITRE Tactic)The MITRE ATT&CK tactic (TA0007) covering techniques attackers use to learn about a compromised environment after gaining access.


Discovery (MITRE ATT&CK tactic TA0007) describes the internal reconnaissance an adversary performs after establishing a foothold. It includes account discovery, system and network configuration discovery, domain trust enumeration, file and directory listing, browser bookmark and password store enumeration, cloud service discovery, security software discovery, and tools like BloodHound for Active Directory attack-path mapping. Discovery is largely a read-only activity, which makes it hard to block directly, but it generates distinctive command-line and API patterns. Defenders use EDR, command-line auditing, deception (honey accounts/files), and detections for tools like BloodHound, AdFind, or net.exe sweeps to catch attackers between Initial Access and Lateral Movement.

Examples

  1. 01

    Running BloodHound's SharpHound collector to map AD privilege paths to Domain Admin.

  2. 02

    Executing net group "Domain Admins" /domain to enumerate privileged accounts.

Frequently asked questions

What is Discovery (MITRE Tactic)?

The MITRE ATT&CK tactic (TA0007) covering techniques attackers use to learn about a compromised environment after gaining access. It belongs to the Defense & Operations category of cybersecurity.

What does Discovery (MITRE Tactic) mean?

The MITRE ATT&CK tactic (TA0007) covering techniques attackers use to learn about a compromised environment after gaining access.

How does Discovery (MITRE Tactic) work?

Discovery (MITRE ATT&CK tactic TA0007) describes the internal reconnaissance an adversary performs after establishing a foothold. It includes account discovery, system and network configuration discovery, domain trust enumeration, file and directory listing, browser bookmark and password store enumeration, cloud service discovery, security software discovery, and tools like BloodHound for Active Directory attack-path mapping. Discovery is largely a read-only activity, which makes it hard to block directly, but it generates distinctive command-line and API patterns. Defenders use EDR, command-line auditing, deception (honey accounts/files), and detections for tools like BloodHound, AdFind, or net.exe sweeps to catch attackers between Initial Access and Lateral Movement.

How do you defend against Discovery (MITRE Tactic)?

Defences for Discovery (MITRE Tactic) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Discovery (MITRE Tactic)?

Common alternative names include: Internal reconnaissance, TA0007.

Related terms