T1016 - System Network Configuration Discovery
Tactics:
Discovery
Discovery
Platforms:
ESXi Linux macOS Network Devices +1
ESXi Linux macOS Network Devices +1
Detection:
Not specified
Not specified
Description:
Adversaries may look for details about the network configuration and settings, such as IP and/or MAC addresses, of systems they access or through information discovery of remote systems. Several operating system administration utilities exist that can be used to gather this information. Examples include [Arp](https://attack.mitre.org/software/S0099), [ipconfig](https://attack.mitre.org/software/S0100)/[ifconfig](https://attack.mitre.org/software/S0101), [nbtstat](https://attack.mitre.org/software/S0102), and [route](https://attack.mitre.org/software/S0103).
Adversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to gather information about configurations and settings, such as IP addresses of configured interfaces and static/dynamic routes (e.g. <code>show ip route</code>, <code>show ip interface</code>).(Citation: US-CERT-TA18-106A)(Citation: Mandiant APT41 Global Intrusion ) On ESXi, adversaries may leverage esxcli to gather network configuration information. For example, the command `esxcli network nic list` will retrieve the MAC address, while `esxcli network ip interface ipv4 get` will retrieve the local IPv4 address.(Citation: Trellix Rnasomhouse 2024)
Adversaries may use the information from [System Network Configuration Discovery](https://attack.mitre.org/techniques/T1016) during automated discovery to shape follow-on behaviors, including determining certain access within the target network and what actions to do next.
Adversaries may also leverage a [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) on network devices to gather information about configurations and settings, such as IP addresses of configured interfaces and static/dynamic routes (e.g. <code>show ip route</code>, <code>show ip interface</code>).(Citation: US-CERT-TA18-106A)(Citation: Mandiant APT41 Global Intrusion ) On ESXi, adversaries may leverage esxcli to gather network configuration information. For example, the command `esxcli network nic list` will retrieve the MAC address, while `esxcli network ip interface ipv4 get` will retrieve the local IPv4 address.(Citation: Trellix Rnasomhouse 2024)
Adversaries may use the information from [System Network Configuration Discovery](https://attack.mitre.org/techniques/T1016) during automated discovery to shape follow-on behaviors, including determining certain access within the target network and what actions to do next.
Used by Actors (20)
APT1
Nation-state
Nation-state
APT3
Nation-state
Nation-state
DarkHotel
Nation-state
Nation-state
APT19
Nation-state
Nation-state
Naikon
Nation-state
Nation-state
Turla
Nation-state
Nation-state
Lazarus Group
Nation-state
Nation-state
Stealth Falcon
Nation-state
Nation-state
OilRig
Nation-state
Nation-state
APT32
Nation-state
Nation-state
Kimsuky
Nation-state
Nation-state
MuddyWater
Nation-state
Nation-state
MUSTANG PANDA
Nation-state
Nation-state
WIZARD SPIDER
Nation-state
Nation-state
APT41
Nation-state
Nation-state
Higaisa
Nation-state
Nation-state
GALLIUM
Unknown
Unknown
TeamTNT
Unknown
Unknown
HAFNIUM
Unknown
Unknown
FIN13
Unknown
Unknown
Malware (20)
Metadata
| MITRE ID: | T1016 |
| STIX ID: | attack-pattern--707399d6-ab3e-... |
| Platforms: | ESXi, Linux, macOS, Network Devices, Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |