Common Information
Type | Value |
---|---|
Value |
Command-Line Interface |
Category | Attack-Pattern |
Type | Mitre-Ics-Techniques |
Misp Type | Cluster |
Description | Adversaries may utilize command-line interfaces (CLIs) to interact with systems and execute commands. CLIs provide a means of interacting with computer systems and are a common feature across many types of platforms and devices within control systems environments. Adversaries may also use CLIs to install and run new software, including malicious tools that may be installed over the course of an operation. CLIs are typically accessed locally, but can also be exposed via services, such as SSH, Telnet, and RDP. Commands that are executed in the CLI execute with the current permissions level of the process running the terminal emulator, unless the command specifies a change in permissions context. Many controllers have CLI interfaces for management purposes. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-05-31 | 1 | 40 most important Linux commands | ||
Details | Website | 2023-05-30 | 17 | Automate Web Reconnaissance and Security Testing with PhantomWeb | ||
Details | Website | 2023-05-30 | 0 | Automating AWS Security Checks: Must-Have Open-Source Tools | ||
Details | Website | 2023-05-25 | 15 | Bridging the Security Gap: Mitigating Lateral Movement Risks from On-Premises to Cloud Environments | Wiz Blog | ||
Details | Website | 2023-05-22 | 0 | How to Implement the MITRE ATT&CK Framework in Blue Team Operations | ||
Details | Website | 2023-05-22 | 141 | IcedID Macro Ends in Nokoyawa Ransomware - The DFIR Report | ||
Details | Website | 2023-05-18 | 0 | How to Reduce MTTR by 70% with Intent-Based Analytics | Official Juniper Networks Blogs | ||
Details | Website | 2023-05-18 | 0 | Operating system and Linux distributions | ||
Details | Website | 2023-05-16 | 2 | A Comprehensive Guide to Operating Systems: Types and Distributions | ||
Details | Website | 2023-05-16 | 3 | Advanced Command Injection, Exploitation Techniques, and Prevention Measures | ||
Details | Website | 2023-05-16 | 6 | Trustwave Threat Hunt Team Uncovers Healthcare Industry Vulnerabilities | ||
Details | Website | 2023-05-13 | 2 | Beginner’s Guide: How to Use Kali Linux | ||
Details | Website | 2023-05-12 | 0 | Maximizing Metasploit: Hiding Backdoors. | ||
Details | Website | 2023-05-11 | 2 | Exploring the World of Cybersecurity with OverTheWire Bandit | ||
Details | Website | 2023-05-10 | 2 | A Perfect Guide that explains the Differences between a Hub and a Switch — Part 1 | ||
Details | Website | 2023-05-07 | 4 | An Introduction to Nmap: Commands, Installation, and Precautions | ||
Details | Website | 2023-05-03 | 4 | Linux Software Management | ||
Details | Website | 2023-05-03 | 5 | Basic Linux File Editing | ||
Details | Website | 2023-05-02 | 2 | China 'Innovated' Its Cyberattack Tradecraft, Mandia Says | ||
Details | Website | 2023-04-26 | 0 | Understanding the Shell Shock Vulnerability: A Comprehensive Guide | 2023 | ||
Details | Website | 2023-04-26 | 0 | Top 5 tools in Kali Linux for information gathering | ||
Details | Website | 2023-04-26 | 2 | Attackers Use Containers for Profit via TrafficStealer | ||
Details | Website | 2023-04-25 | 2 | Understanding And Using The Shell Scripts In Linux | ||
Details | Website | 2023-04-24 | 0 | Fuzzing: Uncovering Cybersecurity Vulnerabilities | ||
Details | Website | 2023-04-23 | 6 | Introducing my new macOS Security Tool: Mergen. |