Common Information
Type Value
Value
Client Configurations - T1592.004
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may gather information about the victim's client configurations that can be used during targeting. Information about client configurations may include a variety of details and settings, including operating system/version, virtualization, architecture (ex: 32 or 64 bit), language, and/or time zone. Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) (ex: listening ports, server banners, user agent strings) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Adversaries may also compromise sites then include malicious content designed to collect host information from visitors.(Citation: ATT ScanBox) Information about the client configurations may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices). Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Supply Chain Compromise](https://attack.mitre.org/techniques/T1195) or [External Remote Services](https://attack.mitre.org/techniques/T1133)).
Details Published Attributes CTI Title
Details Website 2024-11-16 90 From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-07-05 3 The Story of regreSSHion: A Resurfaced sshd Vulnerability
Details Website 2023-09-15 25 Bumblebee Loader Resurfaces in New Campaign
Details Website 2023-05-23 0 Faster AWS cloud connections with TLS 1.3 | Amazon Web Services
Details Website 2023-04-24 6 No Portals Needed
Details Website 2022-08-01 624 Vulnerability Summary for the Week of July 25, 2022 | CISA
Details Website 2022-07-22 3 UNKNOWN
Details Website 2022-07-14 41 Rapid Response: The Ngrok Incident Guide
Details Website 2021-05-08 36 Tracking One Year of Malicious Tor Exit Relay Activities (Part II)
Details Website 2021-04-21 36 Monitoring Pulse Connect Secure With Splunk (CISA Emergency Directive 21-03)
Details Website 2021-04-20 102 Authentication Bypass Techniques and Pulse Secure Zero-Day
Details Website 2021-01-22 2 Quote unquote - How not to encode passwords
Details Website 2020-05-28 19 Dynamic Data Resolver (DDR) — IDA Plugin 1.0 beta
Details Website 2017-11-15 0 Always On VPN – DirectAccess+ for Windows 10
Details Website 2014-10-01 0 Universal SSL: How It Scales