Common Information
Type | Value |
---|---|
Value |
Tool - T1588.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can be open or closed source, free or commercial. A tool can be used for malicious purposes by an adversary, but (unlike malware) were not intended to be used for those purposes (ex: [PsExec](https://attack.mitre.org/software/S0029)). Tool acquisition can involve the procurement of commercial software licenses, including for red teaming tools such as [Cobalt Strike](https://attack.mitre.org/software/S0154). Commercial software may be obtained through purchase, stealing licenses (or licensed copies of the software), or cracking trial versions.(Citation: Recorded Future Beacon 2019) Adversaries may obtain tools to support their operations, including to support execution of post-compromise behaviors. In addition to freely downloading or purchasing software, adversaries may steal software and/or software licenses from third-party entities (including other adversaries). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2005-02-16 | 5 | Rootkit detection, the MS way | ||
Details | Website | 2005-02-08 | 1 | Microsoft Sniffer Detector | ||
Details | Website | 2005-01-20 | 1 | Trojans masquerade as Microsoft AntiSpyware | ||
Details | Website | 2005-01-05 | 11 | Windows Rootkit Detection | ||
Details | Website | 2005-01-01 | 5 | Siemens SIMATIC Step 7 Programmer's Handbook | ||
Details | Website | 2004-06-09 | 2 | Astaro Security Linux earns ICSA Certification | ||
Details | Website | 2004-02-01 | 8 | Win32/Sathurbot.A | ESET Virusradar | ||
Details | Website | 2002-09-20 | 0 | ImperialViolet - Imperial Looms | ||
Details | Website | 2000-01-01 | 1 | Modules vs Programs | ||
Details | Website | 1996-01-01 | 2 | SEC.gov | Request Rate Threshold Exceeded | ||
Details | Website | 0020-03-10 | 0 | Games Without Frontiers: Cybersecurity and Artificial Intelligence | ||
Details | Website | — | 0 | Check your email security, and protect your customers | ||
Details | Website | — | 0 | Recent Sandworm Activity - IBM X-Force Collection | ||
Details | Website | — | 0 | Is blockchain the right tool for you? | ||
Details | Website | — | 0 | DroidJack - Android Remote Administration Tool | ||
Details | Website | — | 6 | Exploiting A Tricky SQL Injection With sqlmap | pentestmonkey | ||
Details | Website | — | 1 | About Us | ||
Details | Website | — | 197 | UNKNOWN | ||
Details | Website | — | 8 | UNKNOWN | ||
Details | Website | — | 1 | UNKNOWN | ||
Details | Website | — | 57 | UNKNOWN |