DiscoveryIn the discovery phase of an attack, attackers gather information about the compromised environment to understand its layout, identify high-value assets, and locate other systems they may wish to target. Discovery is essential for planning lateral movement and for gaining the context needed to elevate privileges or execute further attacks. Common discovery tactics include network scanni..