Skip to main content
MuonPartners
Services
Architecture

Solution design and technology roadmapping

Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security

Security assessments, IAM, and compliance

AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform

Network architecture and cloud platforms

Network DesignCloud StrategyModernisation
Enterprise Architecture

Business-technology alignment

Business AlignmentPortfolio AnalysisGovernance
View all services
ProjectsCase StudiesInsightsToolsAbout
Contact Us

Services

Architecture
Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security
AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform
Network DesignCloud StrategyModernisation
Enterprise Architecture
Business AlignmentPortfolio AnalysisGovernance
ProjectsCase StudiesInsightsToolsAboutContact
Get in Touch
MuonPartners

Strategic technology consulting for Australian organisations navigating complexity.

Services

  • Architecture
  • Cyber Security
  • Network and Platform
  • Enterprise Architecture

Company

  • About
  • Products
  • Frameworks
  • Cross-Framework Mapping
  • Projects
  • Case Studies
  • Insights
  • Contact

Contact

  • [email protected]
  • Australia
  • LinkedIn

© 2026 Muon Partners. All rights reserved.

ABN 50 669 022 315 · A Muon Group company.

Privacy PolicyTerms of Service
  1. Frameworks
  2. >ATTACK
  3. >Collection
  4. >ATTACK-T1113
ATTACK-T1113Active

Screen Capture

Statement

Adversaries may attempt to take screen captures of the desktop to gather information over the course of an operation. Screen capturing functionality may be included as a feature of a remote access tool used in post-compromise operations. Taking a screenshot is also typically possible through native utilities or API calls, such as <code>CopyFromScreen</code>, <code>xwd</code>, or <code>screencapture</code>.(Citation: CopyFromScreen .NET)(Citation: Antiquated Mac Malware)

Location

Tactic
Collection

Technique Details

Identifier
ATTACK-T1113
ATT&CK Page
View on MITRE

Tactics

Collection

Platforms

LinuxWindowsmacOS

Detection

Detect Screen Capture via Commands and API Calls

No cross-framework mappings available

← Back to Collection
Collection36 controls
ATTACK-T1005Data from Local SystemATTACK-T1025Data from Removable MediaATTACK-T1039Data from Network Shared DriveATTACK-T1056Input CaptureATTACK-T1056.001KeyloggingATTACK-T1056.002GUI Input CaptureATTACK-T1056.003Web Portal CaptureATTACK-T1056.004Credential API HookingATTACK-T1074Data StagedATTACK-T1074.001Local Data StagingATTACK-T1074.002Remote Data StagingATTACK-T1113Screen CaptureATTACK-T1114Email CollectionATTACK-T1114.001Local Email CollectionATTACK-T1114.002Remote Email CollectionATTACK-T1114.003Email Forwarding RuleATTACK-T1115Clipboard DataATTACK-T1119Automated CollectionATTACK-T1123Audio CaptureATTACK-T1125Video CaptureATTACK-T1185Browser Session HijackingATTACK-T1213Data from Information RepositoriesATTACK-T1213.001ConfluenceATTACK-T1213.002SharepointATTACK-T1213.003Code RepositoriesATTACK-T1213.004Customer Relationship Management SoftwareATTACK-T1213.005Messaging ApplicationsATTACK-T1213.006DatabasesATTACK-T1530Data from Cloud StorageATTACK-T1560Archive Collected DataATTACK-T1560.001Archive via UtilityATTACK-T1560.002Archive via LibraryATTACK-T1560.003Archive via Custom MethodATTACK-T1602Data from Configuration RepositoryATTACK-T1602.001SNMP (MIB Dump)ATTACK-T1602.002Network Device Configuration Dump