Common Information
Type Value
Value
Command-Line Interface
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may utilize command-line interfaces (CLIs) to interact with systems and execute commands. CLIs provide a means of interacting with computer systems and are a common feature across many types of platforms and devices within control systems environments. Adversaries may also use CLIs to install and run new software, including malicious tools that may be installed over the course of an operation. CLIs are typically accessed locally, but can also be exposed via services, such as SSH, Telnet, and RDP. Commands that are executed in the CLI execute with the current permissions level of the process running the terminal emulator, unless the command specifies a change in permissions context. Many controllers have CLI interfaces for management purposes.
Details Published Attributes CTI Title
Details Website 2023-05-31 1 40 most important Linux commands
Details Website 2023-05-30 17 Automate Web Reconnaissance and Security Testing with PhantomWeb
Details Website 2023-05-30 0 Automating AWS Security Checks: Must-Have Open-Source Tools
Details Website 2023-05-25 15 Bridging the Security Gap: Mitigating Lateral Movement Risks from On-Premises to Cloud Environments | Wiz Blog
Details Website 2023-05-22 0 How to Implement the MITRE ATT&CK Framework in Blue Team Operations
Details Website 2023-05-22 141 IcedID Macro Ends in Nokoyawa Ransomware - The DFIR Report
Details Website 2023-05-18 0 How to Reduce MTTR by 70% with Intent-Based Analytics | Official Juniper Networks Blogs
Details Website 2023-05-18 0 Operating system and Linux distributions
Details Website 2023-05-16 2 A Comprehensive Guide to Operating Systems: Types and Distributions
Details Website 2023-05-16 3 Advanced Command Injection, Exploitation Techniques, and Prevention Measures
Details Website 2023-05-16 6 Trustwave Threat Hunt Team Uncovers Healthcare Industry Vulnerabilities
Details Website 2023-05-13 2 Beginner’s Guide: How to Use Kali Linux
Details Website 2023-05-12 0 Maximizing Metasploit: Hiding Backdoors.
Details Website 2023-05-11 2 Exploring the World of Cybersecurity with OverTheWire Bandit
Details Website 2023-05-10 2 A Perfect Guide that explains the Differences between a Hub and a Switch — Part 1
Details Website 2023-05-07 4 An Introduction to Nmap: Commands, Installation, and Precautions
Details Website 2023-05-03 4 Linux Software Management
Details Website 2023-05-03 5 Basic Linux File Editing
Details Website 2023-05-02 2 China 'Innovated' Its Cyberattack Tradecraft, Mandia Says
Details Website 2023-04-26 0 Understanding the Shell Shock Vulnerability: A Comprehensive Guide | 2023
Details Website 2023-04-26 0 Top 5 tools in Kali Linux for information gathering
Details Website 2023-04-26 2 Attackers Use Containers for Profit via TrafficStealer
Details Website 2023-04-25 2 Understanding And Using The Shell Scripts In Linux
Details Website 2023-04-24 0 Fuzzing: Uncovering Cybersecurity Vulnerabilities
Details Website 2023-04-23 6 Introducing my new macOS Security Tool: Mergen.