Common Information
Type Value
Value
Command-Line Interface - T1059
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Command-line interfaces provide a way of interacting with computer systems and is a common feature across many types of operating system platforms. (Citation: Wikipedia Command-Line Interface) One example command-line interface on Windows systems is cmd, which can be used to perform a number of tasks including execution of other software. Command-line interfaces can be interacted with locally or remotely via a remote desktop application, reverse shell session, etc. Commands that are executed run with the current permission level of the command-line interface process unless the command includes process invocation that changes permissions context for that execution (e.g. Scheduled Task). Adversaries may use command-line interfaces to interact with systems and execute other software during the course of an operation. Detection: Command-line interface activities can be captured through proper logging of process execution with command-line arguments. This information can be useful in gaining additional insight to adversaries' actions through how they use native processes or custom tools. Platforms: Linux, Windows, macOS Data Sources: Process command-line parameters, Process monitoring Permissions Required: Administrator, SYSTEM, User Remote Support: No
Details Published Attributes CTI Title
Details Website 2024-11-17 15 CTF Write-up: Sigma 101 (Certified Cyber Defenders)
Details Website 2024-11-16 0 Understanding Hacking, Virtual Machines, Linux, and Networking: A Comprehensive Guide
Details Website 2024-11-15 38 Dark Web Profile: Cadet Blizzard
Details Website 2024-11-15 33 DONOT's Attack On Maritime & Defense Manufacturing
Details Website 2024-11-14 72 Weekly Intelligence Report - 15 Nov 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-14 24 Major cyber attacks and data breaches of 2024
Details Website 2024-11-14 6 MalwareFortress EP14: Stop Malware in Its Tracks: A Step-by-Step Guide to Track, Test, and…
Details Website 2024-11-13 23 T.A. — RansomHub
Details Website 2024-11-12 0 The Most Powerful Android Penetration Testing Tool: A Deep Dive into Drozer
Details Website 2024-11-12 0 Is Arch Linux Worth All the Pain? My Descent into the Rabbit Hole
Details Website 2024-11-12 8 An In-Depth Guide to the Penetration Testing Framework
Details Website 2024-11-12 26 Dissecting A Multi-Stage PowerShell Campaign Using Chisel
Details Website 2024-11-11 39 Kaspersky discovers new Ymir ransomware used together with RustyStealer | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-11-11 47 Ymir: new stealthy ransomware in the wild
Details Website 2024-11-11 47 Kaspersky discovers new Ymir ransomware used together with RustyStealer
Details Website 2024-11-10 4 Nmap: A Tool for Network Discovery and Security Auditing
Details Website 2024-11-08 25 Dark Web Profile: CosmicBeetle (NoName) Ransomware - SOCRadar® Cyber Intelligence Inc.
Details Website 2024-11-08 7 How I Combined WHOIS, DNS, and Shodan in One Powerful Python Script
Details Website 2024-11-07 63 Weekly Intelligence Report - 08 Nov 2024 | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-07 9 Dark Web Profile: KillSec - SOCRadar® Cyber Intelligence Inc.
Details Website 2024-11-07 11 Dark Web Profile: KillSec
Details Website 2024-11-07 33 Malicious Inauthentic Falcon Crash Reporter Installer Delivers Malware Named Ciro
Details Website 2024-11-07 14 AQUATIC PANDA in Possession of Log4Shell Exploit Tools | CrowdStrike
Details Website 2024-11-06 13 Practical usage of Sysdig OSS
Details Website 2024-11-06 26 Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign