Common Information
Type | Value |
---|---|
Value |
Software - T1592.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather information about the victim's host software that can be used during targeting. Information about installed software may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative of added defensive protections (ex: antivirus, SIEMs, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) (ex: listening ports, server banners, user agent strings) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Adversaries may also compromise sites then include malicious content designed to collect host information from visitors.(Citation: ATT ScanBox) Information about the installed software may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices). Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or for initial access (ex: [Supply Chain Compromise](https://attack.mitre.org/techniques/T1195) or [External Remote Services](https://attack.mitre.org/techniques/T1133)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2574-01-02 | 0 | Editors Picks, Apps We Recommend | TechSpot | ||
Details | Website | 2061-05-15 | 4 | Flash Notice: Critical Linux Kernel Vulnerability Can Lead to Remote Code Execution | ||
Details | Website | 2049-01-13 | 27 | 腾讯安全威胁情报中心推出2023年7月必修安全漏洞清单 | ||
Details | Website | 2044-04-01 | 13 | Attackers Repurposing existing Python-based Malware for Distribution on NPM | ||
Details | Website | 2031-03-19 | 15 | HPSBHF03564 rev 2 - Synaptics Touchpad Driver Potential, Local Loss of Confidentiality | HP® Customer Support | ||
Details | Website | 2030-03-02 | 20 | APT QUARTERLY HIGHLIGHTS - Q3 : 2023 - CYFIRMA | ||
Details | Website | 2028-10-24 | 0 | MIT Technology Review Insights Survey on Zero Trust in Cybersecurity | ||
Details | Website | 2028-02-03 | 0 | Zemana Anti Malware: Best Premium & Free Malware Removal Software | ||
Details | Website | 2028-01-01 | 3 | A Tour of the Worm | ||
Details | Website | 2025-12-14 | 0 | 3 Tips for Eliminating Attack Surface Blind Spots | ||
Details | Website | 2025-12-13 | 0 | Best Practices for Securing Web Applications Against Modern… | ||
Details | Website | 2025-11-27 | 0 | How Agentic AI Is Transforming Enterprise Software… | ||
Details | Website | 2025-11-07 | 1 | Vault7 - Home | ||
Details | Website | 2025-11-03 | 0 | CIS Advisories | ||
Details | Website | 2025-08-01 | 0 | — | ||
Details | Website | 2025-07-02 | 0 | Accountant/Company Secretary (Reqd – Exclnt English, needful exp) | Red Piranha | ||
Details | Website | 2025-07-02 | 0 | Security Operations Analyst (Level 3) | Red Piranha | ||
Details | Website | 2025-07-02 | 13 | Inside a Malware Campaign: A Nigerian Hacker’s Perspective – CyberArmor | ||
Details | Website | 2025-04-18 | 16 | Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 and CVE-2024-20440 - SANS Internet Storm Center | ||
Details | Website | 2025-04-05 | 15 | Shellcode Encoded in UUIDs - SANS Internet Storm Center | ||
Details | Website | 2025-04-05 | 22 | Python Bot Delivered Through DLL Side-Loading - SANS Internet Storm Center | ||
Details | Website | 2025-03-24 | 2 | SvcStealer Malware Strikes, Harvesting Sensitive Data from Browsers and Applications | ||
Details | Website | 2025-03-24 | 0 | What is scamming? | NoSpamProxy | ||
Details | Website | 2025-03-24 | 4 | HackTool:Win64/GameHack!rfn – Easy Malware Removal Guide | ||
Details | Website | 2025-03-24 | 1 | FBI warns of malicious free online document converters spreading malware |