Common Information
Type Value
Value
Tool - T1588.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can be open or closed source, free or commercial. A tool can be used for malicious purposes by an adversary, but (unlike malware) were not intended to be used for those purposes (ex: [PsExec](https://attack.mitre.org/software/S0029)). Tool acquisition can involve the procurement of commercial software licenses, including for red teaming tools such as [Cobalt Strike](https://attack.mitre.org/software/S0154). Commercial software may be obtained through purchase, stealing licenses (or licensed copies of the software), or cracking trial versions.(Citation: Recorded Future Beacon 2019) Adversaries may obtain tools to support their operations, including to support execution of post-compromise behaviors. In addition to freely downloading or purchasing software, adversaries may steal software and/or software licenses from third-party entities (including other adversaries).
Details Published Attributes CTI Title
Details Website 2010-01-05 33 How to Document Servers with SYDI
Details Website 2010-01-01 6 Safe, Reliable, Hash Dumping | Rapid7 Blog
Details Website 2009-12-30 16 Matt's Guide to Vendor Response
Details Website 2009-12-30 28 Dec. 29 CVE-2008-3005 / MS08-043 Darkmoon RAT Excel Russia Foreign Minister Meeting from spoofed daisuke_hasegawa@mofa.go.jp Dec 2009 06:50:10 -0000
Details Website 2009-12-29 7 Meterpreter Pivoting Improved
Details Website 2009-12-17 2 'lit' it
Details Website 2009-12-17 2 Sourcefire VRT Labs
Details Website 2009-12-11 15 Something about Python and network analysis
Details Website 2009-12-11 0 I hope you're happy Bejtlich...you cost me a ton of sleep
Details Website 2009-12-04 0 Best Practices: What is 'best'?
Details Website 2009-11-23 0 Explore Images with Google Image Swirl
Details Website 2009-11-22 4 Even More Linky Goodness...
Details Website 2009-11-18 3 Working with Volume Shadow Copies
Details Website 2009-11-10 0 Turbodiff v1.01 BETA Released - Detect Differences Between Binaries - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2009-11-04 2 Link-alicious
Details Website 2009-11-04 0 UCSniff 3.0 Released - VoIP/IP Video Sniffing Tool - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2009-11-02 3 Paranoia and the rise of fake antivirus
Details Website 2009-10-27 0 Yokoso! - Web Infrastructure Fingerprinting & Delivery Tool - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2009-10-21 0 Rapid7 make bold statement acquiring Metasploit Project
Details Website 2009-10-15 1 MS09-050, SMBv2 and the SDL - Microsoft Security Blog
Details Website 2009-10-10 2 MIR-ROR 1.2 to debut at Digitial Crimes Consortium 2009
Details Website 2009-10-08 1 Trust Technologies: Domain and Forest Trusts
Details Website 2009-09-30 5 A Discussion with the creator of the Social Engineers Toolkit - Security Through Education
Details Website 2009-09-18 103 Password / Word lists :: malicious.link — welcome
Details Website 2009-09-16 2 Time to Revisit Zeus Almighty