Common Information
Type Value
Value
Command-Line Interface
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may utilize command-line interfaces (CLIs) to interact with systems and execute commands. CLIs provide a means of interacting with computer systems and are a common feature across many types of platforms and devices within control systems environments. Adversaries may also use CLIs to install and run new software, including malicious tools that may be installed over the course of an operation. CLIs are typically accessed locally, but can also be exposed via services, such as SSH, Telnet, and RDP. Commands that are executed in the CLI execute with the current permissions level of the process running the terminal emulator, unless the command specifies a change in permissions context. Many controllers have CLI interfaces for management purposes.
Details Published Attributes CTI Title
Details Website 2024-11-16 0 Understanding Hacking, Virtual Machines, Linux, and Networking: A Comprehensive Guide
Details Website 2024-11-14 6 MalwareFortress EP14: Stop Malware in Its Tracks: A Step-by-Step Guide to Track, Test, and…
Details Website 2024-11-12 0 The Most Powerful Android Penetration Testing Tool: A Deep Dive into Drozer
Details Website 2024-11-12 0 Is Arch Linux Worth All the Pain? My Descent into the Rabbit Hole
Details Website 2024-11-12 8 An In-Depth Guide to the Penetration Testing Framework
Details Website 2024-11-10 4 Nmap: A Tool for Network Discovery and Security Auditing
Details Website 2024-11-08 7 How I Combined WHOIS, DNS, and Shodan in One Powerful Python Script
Details Website 2024-11-06 13 Practical usage of Sysdig OSS
Details Website 2024-11-06 2 Shells Overview — Tryhackme Walkthrough
Details Website 2024-11-06 13 Practical usage of Sysdig OSS
Details Website 2024-11-04 17 THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03)
Details Website 2024-11-04 17 THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03) - RedPacket Security
Details Website 2024-11-02 3 TryHackMe | Shells Overview | WriteUp
Details Website 2024-10-31 0 A Comprehensive Guide to Configuring and Managing Firewalls in Linux
Details Website 2024-10-30 4 TryHackMe — Shells — Walk through
Details Website 2024-10-27 4 Exploring Popular Password Hacking Tools
Details Website 2024-10-27 0 What is Vlan ?
Details Website 2024-10-23 2 Cyber Briefing: 2024.10.23
Details Website 2024-10-23 76 Embargo ransomware: Rock’n’Rust
Details Website 2024-10-20 1 Kali Linux: A Comprehensive Guide for Beginners and Intermediate Users
Details Website 2024-10-19 3 Understanding F5 LTM: A Beginner’s Guide to Local Traffic Management
Details Website 2024-10-18 1 Unveiling YARA: A Powerful Tool for Malware Analysis
Details Website 2024-10-17 19 Securing Android Apps by Merging SQLCipher Integration with Reverse Engineering Techniques
Details Website 2024-10-15 898 US-CERT Vulnerability Summary for the Week of October 7, 2024 - RedPacket Security
Details Website 2024-10-15 62 Silent Threat: Red Team Tool EDRSilencer Disrupting Endpoint Security Solutions