Skip to main content
MuonPartners
Services
Architecture

Solution design and technology roadmapping

Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security

Security assessments, IAM, and compliance

AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform

Network architecture and cloud platforms

Network DesignCloud StrategyModernisation
Enterprise Architecture

Business-technology alignment

Business AlignmentPortfolio AnalysisGovernance
View all services
ProjectsCase StudiesInsightsToolsAbout
Contact Us

Services

Architecture
Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security
AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform
Network DesignCloud StrategyModernisation
Enterprise Architecture
Business AlignmentPortfolio AnalysisGovernance
ProjectsCase StudiesInsightsToolsAboutContact
Get in Touch
MuonPartners

Strategic technology consulting for Australian organisations navigating complexity.

Services

  • Architecture
  • Cyber Security
  • Network and Platform
  • Enterprise Architecture

Company

  • About
  • Products
  • Frameworks
  • Cross-Framework Mapping
  • Projects
  • Case Studies
  • Insights
  • Contact

Contact

  • [email protected]
  • Australia
  • LinkedIn

© 2026 Muon Partners. All rights reserved.

ABN 50 669 022 315 · A Muon Group company.

Privacy PolicyTerms of Service
  1. Frameworks
  2. >ATTACK
  3. >Discovery
  4. >ATTACK-T1016
ATTACK-T1016Active

System Network Configuration Discovery

Statement

Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. Several operating system administration utilities exist that can be used to gather this information. Examples include Arp, ipconfig/ifconfig, nbtstat, and route.

Adversaries may also leverage a Network Device CLI on network devices to gather information about configurations and settings, such as IP addresses of configured interfaces and static/dynamic routes (e.g. <code>show ip route</code>, <code>show ip interface</code>).(Citation: US-CERT-TA18-106A)(Citation: Mandiant APT41 Global Intrusion ) On ESXi, adversaries may leverage esxcli to gather network configuration information. For example, the command esxcli network nic list will retrieve the MAC address, while esxcli network ip interface ipv4 get will retrieve the local IPv4 address.(Citation: Trellix Rnasomhouse 2024)

Adversaries may use the information from System Network Configuration Discovery during automated discovery to shape follow-on behaviors, including determining certain access within the target network and what actions to do next.

Location

Tactic
Discovery

Technique Details

Identifier
ATTACK-T1016
ATT&CK Page
View on MITRE

Tactics

Discovery

Platforms

ESXiLinuxmacOSNetwork DevicesWindows

Detection

Behavioral Detection of System Network Configuration Discovery

No cross-framework mappings available

← Back to Discovery
Discovery43 controls
ATTACK-T1007System Service DiscoveryATTACK-T1010Application Window DiscoveryATTACK-T1012Query RegistryATTACK-T1016System Network Configuration DiscoveryATTACK-T1016.001Internet Connection DiscoveryATTACK-T1016.002Wi-Fi DiscoveryATTACK-T1018Remote System DiscoveryATTACK-T1033System Owner/User DiscoveryATTACK-T1046Network Service DiscoveryATTACK-T1049System Network Connections DiscoveryATTACK-T1057Process DiscoveryATTACK-T1069Permission Groups DiscoveryATTACK-T1069.001Local GroupsATTACK-T1069.002Domain GroupsATTACK-T1069.003Cloud GroupsATTACK-T1082System Information DiscoveryATTACK-T1083File and Directory DiscoveryATTACK-T1087Account DiscoveryATTACK-T1087.001Local AccountATTACK-T1087.002Domain AccountATTACK-T1087.003Email AccountATTACK-T1087.004Cloud AccountATTACK-T1120Peripheral Device DiscoveryATTACK-T1124System Time DiscoveryATTACK-T1135Network Share DiscoveryATTACK-T1201Password Policy DiscoveryATTACK-T1217Browser Information DiscoveryATTACK-T1482Domain Trust DiscoveryATTACK-T1518Software DiscoveryATTACK-T1518.001Security Software DiscoveryATTACK-T1518.002Backup Software DiscoveryATTACK-T1526Cloud Service DiscoveryATTACK-T1538Cloud Service DashboardATTACK-T1580Cloud Infrastructure DiscoveryATTACK-T1613Container and Resource DiscoveryATTACK-T1614System Location DiscoveryATTACK-T1614.001System Language DiscoveryATTACK-T1615Group Policy DiscoveryATTACK-T1619Cloud Storage Object DiscoveryATTACK-T1652Device Driver DiscoveryATTACK-T1654Log EnumerationATTACK-T1673Virtual Machine DiscoveryATTACK-T1680Local Storage Discovery