Skip to main content
T1083Discoveryeasy difficulty

File and Directory Discovery

File and Directory Discovery (T1083) is a MITRE ATT&CK technique in the Discovery tactic. SOC analysts detect it by monitoring for XDR, SIEM events, behavioral anomalies, and the specific indicators described in this detection guide. Practice detection in SOCSimulator Operations.

XDRSIEM

What is File and Directory Discovery?

Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system. Adversaries may use the information from File and Directory Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully invests in a compromise. On Windows systems, attackers use dir commands, tree, and PowerShell cmdlets to enumerate directory structures. On Linux, find, ls, and locate are commonly used for file system reconnaissance. Attackers search for sensitive files including configuration files with credentials, database files, source code repositories, backup files, SSH private keys, and documents containing confidential business information. The goal is to identify valuable data to exfiltrate and to find additional credentials that can be used for further access.

File and Directory Discovery is documented as technique T1083 in the MITRE ATT&CK knowledge base under the Discovery tactic. Detection requires visibility into XDR, SIEM telemetry.

Detection Strategies

The following detection strategies help SOC analysts identify File and Directory Discovery activity. These methods apply across XDR, SIEM environments and can be implemented as detection rules, correlation queries, or behavioral analytics in your security platform.

  1. 1

    Monitor for file system enumeration commands particularly those searching for file types commonly associated with credentials and sensitive data such as *.kdbx, *.pfx, *.key, id_rsa, *.config, and *.rdp files.

  2. 2

    Alert on processes accessing large numbers of files in quick succession, particularly across multiple directories, as this pattern is consistent with automated file search operations rather than normal user activity.

  3. 3

    Detect searches targeting specific sensitive directories including backup locations, certificate stores, SSH key directories, and application configuration paths that are not normally accessed by standard user processes.

  4. 4

    Monitor for PowerShell Get-ChildItem or Select-String commands searching for specific keywords like password, credential, secret, or token within file contents, which indicates targeted credential harvesting.

  5. 5

    Track access to network shares by monitoring SMB access logs, alerting on accounts accessing shares outside of their normal job function or accessing large numbers of files across multiple share locations rapidly.

Example Alerts

These realistic alert examples show what File and Directory Discovery looks like in your security tools. Use them to tune detection rules and train analysts to recognize true positives versus false positives in live environments.

HighXDR

Recursive Search for Credential Files

PowerShell command executed: Get-ChildItem -Recurse -Include *.kdbx,*.pfx,*.p12,id_rsa,*.pem -Path C:\ and \\FILESERVER\. This targeted search for certificate files, private keys, and password manager databases is consistent with post-compromise credential harvesting. The process has subsequently enumerated and copied 14 matching files to a staging directory.

HighSIEM

Sensitive File Access on Finance Share

User account contractor_temp accessed 847 files on the Finance department network share within 15 minutes, including files in budget, payroll, and acquisition subdirectories. This account normally accesses only the Vendors subdirectory for legitimate business purposes. The access pattern suggests systematic data collection prior to exfiltration rather than legitimate work activity.

MediumXDR

Configuration File Search for Database Credentials

Command executed searching for web application configuration files: find / -name "web.config" -o -name "*.config" -o -name "application.properties" 2>/dev/null then piped through grep for password, connectionstring, and credential keywords. This targeted search for configuration files containing database connection strings and API credentials is post-compromise reconnaissance.

Practice Detecting File and Directory Discovery

SOCSimulator provides hands-on training rooms where you investigate real-world attack scenarios including File and Directory Discovery. Build detection skills with zero consequences — free forever.

12,000+ analysts trained
No credit card required

Frequently Asked Questions

How do SOC analysts detect File and Directory Discovery?
SOC analysts detect File and Directory Discovery (T1083) by monitoring XDR, SIEM telemetry for behavioral anomalies and specific indicators. Key detection methods include monitor for file system enumeration commands particularly those searching for file types commonly associated with credentials and sensitive data such . SOCSimulator provides hands-on practice detecting this technique with realistic alerts.
What security tools are used to detect File and Directory Discovery?
File and Directory Discovery can be detected using XDR, SIEM platforms. XDR tools are particularly effective for this technique because they provide visibility into the discovery phase of the attack chain. SOCSimulator simulates all three tool types for hands-on training.
How common is File and Directory Discovery in real-world attacks?
File and Directory Discovery is a well-documented MITRE ATT&CK technique in the Discovery tactic. It appears in threat intelligence reports from multiple security vendors and has been observed in campaigns by various threat actor groups. SOCSimulator includes realistic File and Directory Discovery scenarios based on documented attack patterns, helping analysts build detection intuition.
Can I practice detecting File and Directory Discovery for free?
Yes. SOCSimulator offers free forever access to training scenarios, including Discovery techniques like File and Directory Discovery. You can investigate realistic alerts in guided Operations rooms, build detection skills with SIEM, XDR, and Firewall interfaces, and test yourself under pressure in Shift Mode. No credit card required.
Glossary

What is Lateral Movement? — SOC Glossary

Lateral movement is the attack phase where adversaries expand access from an initial foothold to additional systems, usi…

Read more
Glossary

What is NDR? — SOC Glossary

Network Detection and Response (NDR) is a security platform that passively monitors network traffic using machine learni…

Read more
Glossary

What is Threat Hunting? — SOC Glossary

Threat hunting is the proactive, human-led process of searching through security telemetry to find hidden threats that e…

Read more
Glossary

What is SIEM? — SOC Glossary

Security Information and Event Management (SIEM) is a platform that aggregates, normalizes, and correlates log data from…

Read more
Career Path

Threat Hunter Career Guide — Salary & Skills

Threat Hunters do not wait for alerts. You develop hypotheses based on threat intelligence and adversary behavior models…

Read more
Career Path

SOC Analyst (Tier 2) Career Guide — Salary & Skills

Tier 2 SOC Analysts handle the investigations that Tier 1 escalates. You dig into multi-stage attacks, coordinate contai…

Read more
Tool

XDR Training Console — SOCSimulator

The XDR console in SOCSimulator replicates the investigation workflow of platforms like CrowdStrike Falcon, Microsoft De…

Read more
Tool

SIEM Training Console — SOCSimulator

The SIEM console in SOCSimulator replicates the workflow of enterprise platforms like Splunk Enterprise Security, Micros…

Read more
Comparison

SOCSimulator Vs. Letsdefend — Platform Comparison

SOCSimulator wins on operational realism. You get multi-tool shift simulation with SLA pressure, noise injection, and al…

Read more
Comparison

SOCSimulator Vs. Tryhackme — Platform Comparison

SOCSimulator is the better tool for dedicated SOC analyst preparation. TryHackMe is the better tool for broad cybersecur…

Read more
Glossary

SOC Glossary — Security Operations Terminology

Complete glossary of Security Operations Center terminology for aspiring SOC analysts.

Read more
Feature

Shift Mode — Real-Time SOC Simulation

Practice alert triage under realistic time pressure with SLA timers and noise injection.

Read more

We use cookies to improve your experience and measure usage. Learn more