Common Information
Type Value
Value
Tool - T1588.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can be open or closed source, free or commercial. A tool can be used for malicious purposes by an adversary, but (unlike malware) were not intended to be used for those purposes (ex: [PsExec](https://attack.mitre.org/software/S0029)). Tool acquisition can involve the procurement of commercial software licenses, including for red teaming tools such as [Cobalt Strike](https://attack.mitre.org/software/S0154). Commercial software may be obtained through purchase, stealing licenses (or licensed copies of the software), or cracking trial versions.(Citation: Recorded Future Beacon 2019) Adversaries may obtain tools to support their operations, including to support execution of post-compromise behaviors. In addition to freely downloading or purchasing software, adversaries may steal software and/or software licenses from third-party entities (including other adversaries).
Details Published Attributes CTI Title
Details Website 2024-11-17 0 ChatGPT Security Risks for Business: The Essential Checklist for Protection
Details Website 2024-11-17 1 Shop For Affordable VPN
Details Website 2024-11-17 1 Shop For Top-rated VPN
Details Website 2024-11-16 1 Solid Security Pro Review
Details Website 2024-11-16 22 Hunter Lab Cyber Defenders
Details Website 2024-11-16 0 McAfee+ Advanced 2025 Review: Your Identity’s Best Friend
Details Website 2024-11-16 17 hashtalk 006: interactive games for cybersecurity engineers that don’t suck and how to treat them…
Details Website 2024-11-16 0 The Rising Threat of Cybercrime: How to Protect Yourself in an Increasingly Digital World
Details Website 2024-11-16 2 Guide to Becoming an Ethical Hacker: From Basics to Advanced Knowledge
Details Website 2024-11-16 1 Is Vpn Free On Pc? — Comprehensive Guide And FAQs
Details Website 2024-11-16 2 injection-attacks
Details Website 2024-11-16 0 [CyberSec Pills] Enhancing Cybersecurity Through Risk Assessment
Details Website 2024-11-16 0 Zero Trust Security: Pitfalls and How to Overcome Them
Details Website 2024-11-16 90 From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-16 14 Building an Integrated Threat Intelligence Platform Using Python and Kibana
Details Website 2024-11-16 0 How to Add Windows Machines as Log Sources to QRadar: A Step-by-Step Guide
Details Website 2024-11-16 10 How Did I Get My First Collaboration Bounty Of $1000?
Details Website 2024-11-16 1 Solid Security Pro Review
Details Website 2024-11-16 0 Solid Security Pro Review
Details Website 2024-11-16 1 Solid Security Pro Security Measures review
Details Website 2024-11-16 2 Reoon Email: Cutting-edge Verification Tools
Details Website 2024-11-16 0 Exploring the Essentials of Hacking, Virtual Machines, Linux, and Networking
Details Website 2024-11-16 1 Top-rated VPN Low Prices
Details Website 2024-11-16 0 Here's What a Hacker Could Really Do With Access to Your Wi-Fi Router | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
Details Website 2024-11-16 3 How to locate person mobile device using this hacking software.