Common Information
Type Value
Value
Tool - T1588.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can be open or closed source, free or commercial. A tool can be used for malicious purposes by an adversary, but (unlike malware) were not intended to be used for those purposes (ex: [PsExec](https://attack.mitre.org/software/S0029)). Tool acquisition can involve the procurement of commercial software licenses, including for red teaming tools such as [Cobalt Strike](https://attack.mitre.org/software/S0154). Commercial software may be obtained through purchase, stealing licenses (or licensed copies of the software), or cracking trial versions.(Citation: Recorded Future Beacon 2019) Adversaries may obtain tools to support their operations, including to support execution of post-compromise behaviors. In addition to freely downloading or purchasing software, adversaries may steal software and/or software licenses from third-party entities (including other adversaries).
Details Published Attributes CTI Title
Details Website 2005-02-16 5 Rootkit detection, the MS way
Details Website 2005-02-08 1 Microsoft Sniffer Detector
Details Website 2005-01-20 1 Trojans masquerade as Microsoft AntiSpyware
Details Website 2005-01-05 11 Windows Rootkit Detection
Details Website 2005-01-01 5 Siemens SIMATIC Step 7 Programmer's Handbook
Details Website 2004-06-09 2 Astaro Security Linux earns ICSA Certification
Details Website 2004-02-01 8 Win32/Sathurbot.A | ESET Virusradar
Details Website 2002-09-20 0 ImperialViolet - Imperial Looms
Details Website 2000-01-01 1 Modules vs Programs
Details Website 1996-01-01 2 SEC.gov | Request Rate Threshold Exceeded
Details Website 0020-03-10 0 Games Without Frontiers: Cybersecurity and Artificial Intelligence
Details Website 0 Check your email security, and protect your customers
Details Website 0 Recent Sandworm Activity - IBM X-Force Collection
Details Website 0 Is blockchain the right tool for you?
Details Website 0 DroidJack - Android Remote Administration Tool
Details Website 6 Exploiting A Tricky SQL Injection With sqlmap | pentestmonkey
Details Website 1 About Us
Details Website 197 UNKNOWN
Details Website 8 UNKNOWN
Details Website 1 UNKNOWN
Details Website 57 UNKNOWN