Common Information
Type | Value |
---|---|
Value |
Tool - T1588.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can be open or closed source, free or commercial. A tool can be used for malicious purposes by an adversary, but (unlike malware) were not intended to be used for those purposes (ex: [PsExec](https://attack.mitre.org/software/S0029)). Tool acquisition can involve the procurement of commercial software licenses, including for red teaming tools such as [Cobalt Strike](https://attack.mitre.org/software/S0154). Commercial software may be obtained through purchase, stealing licenses (or licensed copies of the software), or cracking trial versions.(Citation: Recorded Future Beacon 2019) Adversaries may obtain tools to support their operations, including to support execution of post-compromise behaviors. In addition to freely downloading or purchasing software, adversaries may steal software and/or software licenses from third-party entities (including other adversaries). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-17 | 0 | ChatGPT Security Risks for Business: The Essential Checklist for Protection | ||
Details | Website | 2024-11-17 | 1 | Shop For Affordable VPN | ||
Details | Website | 2024-11-17 | 1 | Shop For Top-rated VPN | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 22 | Hunter Lab Cyber Defenders | ||
Details | Website | 2024-11-16 | 0 | McAfee+ Advanced 2025 Review: Your Identity’s Best Friend | ||
Details | Website | 2024-11-16 | 17 | hashtalk 006: interactive games for cybersecurity engineers that don’t suck and how to treat them… | ||
Details | Website | 2024-11-16 | 0 | The Rising Threat of Cybercrime: How to Protect Yourself in an Increasingly Digital World | ||
Details | Website | 2024-11-16 | 2 | Guide to Becoming an Ethical Hacker: From Basics to Advanced Knowledge | ||
Details | Website | 2024-11-16 | 1 | Is Vpn Free On Pc? — Comprehensive Guide And FAQs | ||
Details | Website | 2024-11-16 | 2 | injection-attacks | ||
Details | Website | 2024-11-16 | 0 | [CyberSec Pills] Enhancing Cybersecurity Through Risk Assessment | ||
Details | Website | 2024-11-16 | 0 | Zero Trust Security: Pitfalls and How to Overcome Them | ||
Details | Website | 2024-11-16 | 90 | From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 14 | Building an Integrated Threat Intelligence Platform Using Python and Kibana | ||
Details | Website | 2024-11-16 | 0 | How to Add Windows Machines as Log Sources to QRadar: A Step-by-Step Guide | ||
Details | Website | 2024-11-16 | 10 | How Did I Get My First Collaboration Bounty Of $1000? | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 0 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Security Measures review | ||
Details | Website | 2024-11-16 | 2 | Reoon Email: Cutting-edge Verification Tools | ||
Details | Website | 2024-11-16 | 0 | Exploring the Essentials of Hacking, Virtual Machines, Linux, and Networking | ||
Details | Website | 2024-11-16 | 1 | Top-rated VPN Low Prices | ||
Details | Website | 2024-11-16 | 0 | Here's What a Hacker Could Really Do With Access to Your Wi-Fi Router | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 3 | How to locate person mobile device using this hacking software. |