Common Information
Type | Value |
---|---|
Value |
Command-Line Interface |
Category | Attack-Pattern |
Type | Mitre-Ics-Techniques |
Misp Type | Cluster |
Description | Adversaries may utilize command-line interfaces (CLIs) to interact with systems and execute commands. CLIs provide a means of interacting with computer systems and are a common feature across many types of platforms and devices within control systems environments. Adversaries may also use CLIs to install and run new software, including malicious tools that may be installed over the course of an operation. CLIs are typically accessed locally, but can also be exposed via services, such as SSH, Telnet, and RDP. Commands that are executed in the CLI execute with the current permissions level of the process running the terminal emulator, unless the command specifies a change in permissions context. Many controllers have CLI interfaces for management purposes. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-16 | 0 | Understanding Hacking, Virtual Machines, Linux, and Networking: A Comprehensive Guide | ||
Details | Website | 2024-11-14 | 6 | MalwareFortress EP14: Stop Malware in Its Tracks: A Step-by-Step Guide to Track, Test, and… | ||
Details | Website | 2024-11-12 | 0 | The Most Powerful Android Penetration Testing Tool: A Deep Dive into Drozer | ||
Details | Website | 2024-11-12 | 0 | Is Arch Linux Worth All the Pain? My Descent into the Rabbit Hole | ||
Details | Website | 2024-11-12 | 8 | An In-Depth Guide to the Penetration Testing Framework | ||
Details | Website | 2024-11-10 | 4 | Nmap: A Tool for Network Discovery and Security Auditing | ||
Details | Website | 2024-11-08 | 7 | How I Combined WHOIS, DNS, and Shodan in One Powerful Python Script | ||
Details | Website | 2024-11-06 | 13 | Practical usage of Sysdig OSS | ||
Details | Website | 2024-11-06 | 2 | Shells Overview — Tryhackme Walkthrough | ||
Details | Website | 2024-11-06 | 13 | Practical usage of Sysdig OSS | ||
Details | Website | 2024-11-04 | 17 | THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03) | ||
Details | Website | 2024-11-04 | 17 | THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03) - RedPacket Security | ||
Details | Website | 2024-11-02 | 3 | TryHackMe | Shells Overview | WriteUp | ||
Details | Website | 2024-10-31 | 0 | A Comprehensive Guide to Configuring and Managing Firewalls in Linux | ||
Details | Website | 2024-10-30 | 4 | TryHackMe — Shells — Walk through | ||
Details | Website | 2024-10-27 | 4 | Exploring Popular Password Hacking Tools | ||
Details | Website | 2024-10-27 | 0 | What is Vlan ? | ||
Details | Website | 2024-10-23 | 2 | Cyber Briefing: 2024.10.23 | ||
Details | Website | 2024-10-23 | 76 | Embargo ransomware: Rock’n’Rust | ||
Details | Website | 2024-10-20 | 1 | Kali Linux: A Comprehensive Guide for Beginners and Intermediate Users | ||
Details | Website | 2024-10-19 | 3 | Understanding F5 LTM: A Beginner’s Guide to Local Traffic Management | ||
Details | Website | 2024-10-18 | 1 | Unveiling YARA: A Powerful Tool for Malware Analysis | ||
Details | Website | 2024-10-17 | 19 | Securing Android Apps by Merging SQLCipher Integration with Reverse Engineering Techniques | ||
Details | Website | 2024-10-15 | 898 | US-CERT Vulnerability Summary for the Week of October 7, 2024 - RedPacket Security | ||
Details | Website | 2024-10-15 | 62 | Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions |