Common Information
Type | Value |
---|---|
Value |
Command-Line Interface |
Category | Attack-Pattern |
Type | Mitre-Ics-Techniques |
Misp Type | Cluster |
Description | Adversaries may utilize command-line interfaces (CLIs) to interact with systems and execute commands. CLIs provide a means of interacting with computer systems and are a common feature across many types of platforms and devices within control systems environments. Adversaries may also use CLIs to install and run new software, including malicious tools that may be installed over the course of an operation. CLIs are typically accessed locally, but can also be exposed via services, such as SSH, Telnet, and RDP. Commands that are executed in the CLI execute with the current permissions level of the process running the terminal emulator, unless the command specifies a change in permissions context. Many controllers have CLI interfaces for management purposes. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2016-04-19 | 1 | Improvements to our Heroku add-on | ||
Details | Website | 2016-03-31 | 3 | The evolution of Brazilian Malware | ||
Details | Website | 2016-02-09 | 4 | YARA - Pattern Matching Tool For Malware Analysis - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2016-01-05 | 1 | What is Docker? A Revolutionary Change in Cloud Computing | Logz.io | ||
Details | Website | 2015-10-10 | 2 | Duplicate SSL Serial Numbers | ||
Details | Website | 2015-06-07 | 14 | DoS website using slowhttptest in Kali Linux – slowloris, slow HTTP POST and slow Read attack in one tool | ||
Details | Website | 2015-05-06 | 5 | NMSG and JSON encoding | ||
Details | Website | 2014-09-24 | 1 | drozer - The Leading Security Testing Framework For Android - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2014-02-19 | 9 | UNKNOWN | ||
Details | Website | 2014-02-03 | 4 | Exploitable vulnerabilities #1 (MS08-067) | Rapid7 Blog | ||
Details | Website | 2013-10-12 | 2 | Fixing PulseAudio configured for per-user sessions … (warning) in Kali Linux and Debian | ||
Details | Website | 2012-06-18 | 0 | Backing Up an ESXi 5 Guest VM by Exporting to OVA/OVF Template | ||
Details | Website | 2012-05-17 | 11 | Enable a Scalable and Secure VMware View Deployment | ||
Details | Website | 2012-02-27 | 0 | Top Considerations When Choosing an ADC | ||
Details | Website | 2012-01-27 | 14 | UNKNOWN | ||
Details | Website | 2011-11-18 | 11 | Microsoft Baseline Security Analyzer | ||
Details | Website | 2011-03-07 | 0 | Metasploit version 3.6 delivers enhanced command-line options and PCI reports | Rapid7 Blog | ||
Details | Website | 2010-12-16 | 0 | Honggfuzz - Simple Command Line Software Fuzzing Tool - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2009-11-17 | 0 | Share a Folder or Drive | ||
Details | Website | — | 0 | ConfuserEx |