Common Information
Type Value
Value
Software - T1592.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may gather information about the victim's host software that can be used during targeting. Information about installed software may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative of added defensive protections (ex: antivirus, SIEMs, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) (ex: listening ports, server banners, user agent strings) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Adversaries may also compromise sites then include malicious content designed to collect host information from visitors.(Citation: ATT ScanBox) Information about the installed software may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices). Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or for initial access (ex: [Supply Chain Compromise](https://attack.mitre.org/techniques/T1195) or [External Remote Services](https://attack.mitre.org/techniques/T1133)).
Details Published Attributes CTI Title
Details Website 2574-01-02 0 Editors Picks, Apps We Recommend | TechSpot
Details Website 2061-05-15 4 Flash Notice: Critical Linux Kernel Vulnerability Can Lead to Remote Code Execution
Details Website 2049-01-13 27 腾讯安全威胁情报中心推出2023年7月必修安全漏洞清单
Details Website 2044-04-01 13 Attackers Repurposing existing Python-based Malware for Distribution on NPM
Details Website 2031-03-19 15 HPSBHF03564 rev 2 - Synaptics Touchpad Driver Potential, Local Loss of Confidentiality | HP® Customer Support
Details Website 2030-03-02 20 APT QUARTERLY HIGHLIGHTS - Q3 : 2023 - CYFIRMA
Details Website 2028-10-24 0 MIT Technology Review Insights Survey on Zero Trust in Cybersecurity
Details Website 2028-02-03 0 Zemana Anti Malware: Best Premium & Free Malware Removal Software
Details Website 2028-01-01 3 A Tour of the Worm
Details Website 2025-12-14 0 3 Tips for Eliminating Attack Surface Blind Spots
Details Website 2025-12-13 0 Best Practices for Securing Web Applications Against Modern…
Details Website 2025-11-27 0 How Agentic AI Is Transforming Enterprise Software…
Details Website 2025-11-07 1 Vault7 - Home
Details Website 2025-11-03 0 CIS Advisories
Details Website 2025-08-01 0
Details Website 2025-07-02 0 Accountant/Company Secretary (Reqd – Exclnt English, needful exp) | Red Piranha
Details Website 2025-07-02 0 Security Operations Analyst (Level 3) | Red Piranha
Details Website 2025-07-02 13 Inside a Malware Campaign: A Nigerian Hacker’s Perspective – CyberArmor
Details Website 2025-04-18 16 Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 and CVE-2024-20440 - SANS Internet Storm Center
Details Website 2025-04-05 15 Shellcode Encoded in UUIDs - SANS Internet Storm Center
Details Website 2025-04-05 22 Python Bot Delivered Through DLL Side-Loading - SANS Internet Storm Center
Details Website 2025-03-24 2 SvcStealer Malware Strikes, Harvesting Sensitive Data from Browsers and Applications
Details Website 2025-03-24 0 What is scamming? | NoSpamProxy
Details Website 2025-03-24 4 HackTool:Win64/GameHack!rfn – Easy Malware Removal Guide
Details Website 2025-03-24 1 FBI warns of malicious free online document converters spreading malware