Common Information
Type Value
Value
Command-Line Interface
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may utilize command-line interfaces (CLIs) to interact with systems and execute commands. CLIs provide a means of interacting with computer systems and are a common feature across many types of platforms and devices within control systems environments. Adversaries may also use CLIs to install and run new software, including malicious tools that may be installed over the course of an operation. CLIs are typically accessed locally, but can also be exposed via services, such as SSH, Telnet, and RDP. Commands that are executed in the CLI execute with the current permissions level of the process running the terminal emulator, unless the command specifies a change in permissions context. Many controllers have CLI interfaces for management purposes.
Details Published Attributes CTI Title
Details Website 2016-04-19 1 Improvements to our Heroku add-on
Details Website 2016-03-31 3 The evolution of Brazilian Malware
Details Website 2016-02-09 4 YARA - Pattern Matching Tool For Malware Analysis - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2016-01-05 1 What is Docker? A Revolutionary Change in Cloud Computing | Logz.io
Details Website 2015-10-10 2 Duplicate SSL Serial Numbers
Details Website 2015-06-07 14 DoS website using slowhttptest in Kali Linux – slowloris, slow HTTP POST and slow Read attack in one tool
Details Website 2015-05-06 5 NMSG and JSON encoding
Details Website 2014-09-24 1 drozer - The Leading Security Testing Framework For Android - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2014-02-19 9 UNKNOWN
Details Website 2014-02-03 4 Exploitable vulnerabilities #1 (MS08-067) | Rapid7 Blog
Details Website 2013-10-12 2 Fixing PulseAudio configured for per-user sessions … (warning) in Kali Linux and Debian
Details Website 2012-06-18 0 Backing Up an ESXi 5 Guest VM by Exporting to OVA/OVF Template
Details Website 2012-05-17 11 Enable a Scalable and Secure VMware View Deployment
Details Website 2012-02-27 0 Top Considerations When Choosing an ADC
Details Website 2012-01-27 14 UNKNOWN
Details Website 2011-11-18 11 Microsoft Baseline Security Analyzer
Details Website 2011-03-07 0 Metasploit version 3.6 delivers enhanced command-line options and PCI reports | Rapid7 Blog
Details Website 2010-12-16 0 Honggfuzz - Simple Command Line Software Fuzzing Tool - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2009-11-17 0 Share a Folder or Drive
Details Website 0 ConfuserEx