T1049 - System Network Connections Discovery
Tactics:
Discovery
Discovery
Platforms:
Windows IaaS Linux macOS +2
Windows IaaS Linux macOS +2
Detection:
Not specified
Not specified
Description:
Adversaries may attempt to get a listing of network connections to or from the compromised system they are currently accessing or from remote systems by querying for information over the network.
An adversary who gains access to a system that is part of a cloud-based environment may map out Virtual Private Clouds or Virtual Networks in order to determine what systems and services are connected. The actions performed are likely the same types of discovery techniques depending on the operating system, but the resulting information may include details about the networked cloud environment relevant to the adversary's goals. Cloud providers may have different ways in which their virtual networks operate.(Citation: Amazon AWS VPC Guide)(Citation: Microsoft Azure Virtual Network Overview)(Citation: Google VPC Overview) Similarly, adversaries who gain access to network devices may also perform similar discovery activities to gather information about connected systems and services.
Utilities and commands that acquire this information include [netstat](https://attack.mitre.org/software/S0104), "net use," and "net session" with [Net](https://attack.mitre.org/software/S0039). In Mac and Linux, [netstat](https://attack.mitre.org/software/S0104) and <code>lsof</code> can be used to list current connections. <code>who -a</code> and <code>w</code> can be used to show which users are currently logged in, similar to "net session". Additionally, built-in features native to network devices and [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) may be used (e.g. <code>show ip sockets</code>, <code>show tcp brief</code>).(Citation: US-CERT-TA18-106A) On ESXi servers, the command `esxi network ip connection list` can be used to list active network connections.(Citation: Sygnia ESXi Ransomware 2025)
An adversary who gains access to a system that is part of a cloud-based environment may map out Virtual Private Clouds or Virtual Networks in order to determine what systems and services are connected. The actions performed are likely the same types of discovery techniques depending on the operating system, but the resulting information may include details about the networked cloud environment relevant to the adversary's goals. Cloud providers may have different ways in which their virtual networks operate.(Citation: Amazon AWS VPC Guide)(Citation: Microsoft Azure Virtual Network Overview)(Citation: Google VPC Overview) Similarly, adversaries who gain access to network devices may also perform similar discovery activities to gather information about connected systems and services.
Utilities and commands that acquire this information include [netstat](https://attack.mitre.org/software/S0104), "net use," and "net session" with [Net](https://attack.mitre.org/software/S0039). In Mac and Linux, [netstat](https://attack.mitre.org/software/S0104) and <code>lsof</code> can be used to list current connections. <code>who -a</code> and <code>w</code> can be used to show which users are currently logged in, similar to "net session". Additionally, built-in features native to network devices and [Network Device CLI](https://attack.mitre.org/techniques/T1059/008) may be used (e.g. <code>show ip sockets</code>, <code>show tcp brief</code>).(Citation: US-CERT-TA18-106A) On ESXi servers, the command `esxi network ip connection list` can be used to list active network connections.(Citation: Sygnia ESXi Ransomware 2025)
Used by Actors (20)
APT1
Nation-state
Nation-state
APT3
Nation-state
Nation-state
Turla
Nation-state
Nation-state
Lazarus Group
Nation-state
Nation-state
Poseidon Group
Unknown
Unknown
OilRig
Nation-state
Nation-state
APT32
Nation-state
Nation-state
APT5
Unknown
Unknown
MuddyWater
Nation-state
Nation-state
MUSTANG PANDA
Nation-state
Nation-state
APT41
Nation-state
Nation-state
GALLIUM
Unknown
Unknown
TeamTNT
Unknown
Unknown
BackdoorDiplomacy
Unknown
Unknown
FIN13
Unknown
Unknown
ToddyCat
Unknown
Unknown
Earth Lusca
Unknown
Unknown
Volt Typhoon
Unknown
Unknown
Velvet Ant
Unknown
Unknown
admin@338
Unknown
Unknown
Malware (20)
Metadata
| MITRE ID: | T1049 |
| STIX ID: | attack-pattern--7e150503-88e7-... |
| Platforms: | Windows, IaaS, Linux, macOS, Network Devices, ESXi |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |