Common Information
Type Value
Value
Tool - T1588.002
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can be open or closed source, free or commercial. A tool can be used for malicious purposes by an adversary, but (unlike malware) were not intended to be used for those purposes (ex: [PsExec](https://attack.mitre.org/software/S0029)). Tool acquisition can involve the procurement of commercial software licenses, including for red teaming tools such as [Cobalt Strike](https://attack.mitre.org/software/S0154). Commercial software may be obtained through purchase, stealing licenses (or licensed copies of the software), or cracking trial versions.(Citation: Recorded Future Beacon 2019) Adversaries may obtain tools to support their operations, including to support execution of post-compromise behaviors. In addition to freely downloading or purchasing software, adversaries may steal software and/or software licenses from third-party entities (including other adversaries).
Details Published Attributes CTI Title
Details Website 2024-11-16 2 Setting Up Filters for Effective Wireshark Analysis
Details Website 2024-11-16 0 Exploring Side-Channel Attacks: Understanding the Risks and Defenses
Details Website 2024-11-16 1 Affordable VPN Services For Sale
Details Website 2024-11-16 1 Streaming VPN Low Prices
Details Website 2024-11-16 1 Top-rated VPN Services For Sale
Details Website 2024-11-16 1 Solid Security Pro Review
Details Website 2024-11-16 54 Silent Threat: How Red Team Tools EDRSilencer Can Disrupt Enterprises Endpoint Security Solutions
Details Website 2024-11-16 0 Why Relying Solely on Database Encryption Could Backfire
Details Website 2024-11-16 12 Unlock Your Hacking Potential: 20 Essential Linux Commands Every Cybersecurity Student Must Know
Details Website 2024-11-16 3 DOM XSS in jQuery selector sink using a hashchange event | PortSwigger | Lab
Details Website 2024-11-16 1 Secret OSINT Tricks to Dig Up Hidden Info Online!
Details Website 2024-11-16 0 Finding Information from a Phone Number: An Ethical Hacking Perspective
Details Website 2024-11-16 2 eJPT v2 : Challenge Lab - 1
Details Website 2024-11-16 7 Challenge Name: ConCmarks
Details Website 2024-11-16 1 Solid Security Pro Review
Details Website 2024-11-16 0 Solid Security Pro Review
Details Website 2024-11-16 1 The Ultimate Cybersecurity Study Guide: Your Roadmap to Mastery
Details Website 2024-11-16 0 Web Security Automation: Your Shield Against Cyber Threats
Details Website 2024-11-16 1 NordVPN software updates review
Details Website 2024-11-16 3 Shop For Top-rated VPN
Details Website 2024-11-16 3 Web Fr1da — Pentest Tool for Android
Details Website 2024-11-16 1 Get Secure VPN Today
Details Website 2024-11-16 1 Cheap Top-rated VPN Offers
Details Website 2024-11-16 0 What you need to know about the WannaCry Ransomware | #ransomware | #cybercrime | National Cyber Security Consulting
Details Website 2024-11-16 1 Cheap Affordable VPN Offers