Common Information
Type | Value |
---|---|
Value |
Tool - T1588.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can be open or closed source, free or commercial. A tool can be used for malicious purposes by an adversary, but (unlike malware) were not intended to be used for those purposes (ex: [PsExec](https://attack.mitre.org/software/S0029)). Tool acquisition can involve the procurement of commercial software licenses, including for red teaming tools such as [Cobalt Strike](https://attack.mitre.org/software/S0154). Commercial software may be obtained through purchase, stealing licenses (or licensed copies of the software), or cracking trial versions.(Citation: Recorded Future Beacon 2019) Adversaries may obtain tools to support their operations, including to support execution of post-compromise behaviors. In addition to freely downloading or purchasing software, adversaries may steal software and/or software licenses from third-party entities (including other adversaries). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-16 | 2 | Setting Up Filters for Effective Wireshark Analysis | ||
Details | Website | 2024-11-16 | 0 | Exploring Side-Channel Attacks: Understanding the Risks and Defenses | ||
Details | Website | 2024-11-16 | 1 | Affordable VPN Services For Sale | ||
Details | Website | 2024-11-16 | 1 | Streaming VPN Low Prices | ||
Details | Website | 2024-11-16 | 1 | Top-rated VPN Services For Sale | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 54 | Silent Threat: How Red Team Tools EDRSilencer Can Disrupt Enterprises Endpoint Security Solutions | ||
Details | Website | 2024-11-16 | 0 | Why Relying Solely on Database Encryption Could Backfire | ||
Details | Website | 2024-11-16 | 12 | Unlock Your Hacking Potential: 20 Essential Linux Commands Every Cybersecurity Student Must Know | ||
Details | Website | 2024-11-16 | 3 | DOM XSS in jQuery selector sink using a hashchange event | PortSwigger | Lab | ||
Details | Website | 2024-11-16 | 1 | Secret OSINT Tricks to Dig Up Hidden Info Online! | ||
Details | Website | 2024-11-16 | 0 | Finding Information from a Phone Number: An Ethical Hacking Perspective | ||
Details | Website | 2024-11-16 | 2 | eJPT v2 : Challenge Lab - 1 | ||
Details | Website | 2024-11-16 | 7 | Challenge Name: ConCmarks | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 0 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 1 | The Ultimate Cybersecurity Study Guide: Your Roadmap to Mastery | ||
Details | Website | 2024-11-16 | 0 | Web Security Automation: Your Shield Against Cyber Threats | ||
Details | Website | 2024-11-16 | 1 | NordVPN software updates review | ||
Details | Website | 2024-11-16 | 3 | Shop For Top-rated VPN | ||
Details | Website | 2024-11-16 | 3 | Web Fr1da — Pentest Tool for Android | ||
Details | Website | 2024-11-16 | 1 | Get Secure VPN Today | ||
Details | Website | 2024-11-16 | 1 | Cheap Top-rated VPN Offers | ||
Details | Website | 2024-11-16 | 0 | What you need to know about the WannaCry Ransomware | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 1 | Cheap Affordable VPN Offers |