Common Information
Type | Value |
---|---|
Value |
Tool - T1588.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may buy, steal, or download software tools that can be used during targeting. Tools can be open or closed source, free or commercial. A tool can be used for malicious purposes by an adversary, but (unlike malware) were not intended to be used for those purposes (ex: [PsExec](https://attack.mitre.org/software/S0029)). Tool acquisition can involve the procurement of commercial software licenses, including for red teaming tools such as [Cobalt Strike](https://attack.mitre.org/software/S0154). Commercial software may be obtained through purchase, stealing licenses (or licensed copies of the software), or cracking trial versions.(Citation: Recorded Future Beacon 2019) Adversaries may obtain tools to support their operations, including to support execution of post-compromise behaviors. In addition to freely downloading or purchasing software, adversaries may steal software and/or software licenses from third-party entities (including other adversaries). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-15 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-15 | 0 | How AI is Revolutionizing Application Security: Real-Life Impact and Future Potential 🚀 | ||
Details | Website | 2024-11-15 | 2 | How to Install Kali Linux on Mac M1/M2/M3: Step-by-Step Guide for Cybersecurity Beginners | ||
Details | Website | 2024-11-15 | 1 | Top 5 Malware Network Traffic Analysis Tools 2024. | ||
Details | Website | 2024-11-15 | 3 | CISA Flags Critical Palo Alto Network Flaws Actively Exploited in the Wild | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-15 | 0 | Excerpts From an Email to My Dean | ||
Details | Website | 2024-11-15 | 2 | Why PTaaS Startups Need a Minimal SaaS Dashboard for Business Growth | ||
Details | Website | 2024-11-15 | 1 | Solid Security Pro Overview review | ||
Details | Website | 2024-11-15 | 4 | John the Ripper: Complete Guide to Cracking Passwords in Cybersecurity | ||
Details | Website | 2024-11-15 | 0 | Computer and Network Security: Top Tactics for Safety | ||
Details | Website | 2024-11-15 | 0 | Safe Browsing Essentials: Navigate the Web Securely | ||
Details | Website | 2024-11-15 | 0 | Encryption Essentials: Secure Your Digital Life Now! | ||
Details | Website | 2024-11-15 | 0 | The invisible cyber shield that combats morphing threats - Cybersecurity Insiders | ||
Details | Website | 2024-11-15 | 0 | Top industries facing cyber threats - Cybersecurity Insiders | ||
Details | Website | 2024-11-15 | 0 | Ransomware continues to pummel organisations in Southeast Asia | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-15 | 0 | Enhancing security posture through advanced offensive security testing - Cybersecurity Insiders | ||
Details | Website | 2024-11-15 | 1 | Online Sale For Unlimited VPN | ||
Details | Website | 2024-11-15 | 1 | Online Sale For Unlimited VPN | ||
Details | Website | 2024-11-15 | 0 | The Legendary Linux Server Security Story: Why Hackers Failed | ||
Details | Website | 2024-11-15 | 1 | Get Affordable VPN Today | ||
Details | Website | 2024-11-15 | 2 | Block CTF 2024 Writeups | ||
Details | Website | 2024-11-15 | 7 | AI Enhancing Your Adversarial Emulation | Google Cloud Blog | ||
Details | Website | 2024-11-15 | 5 | The Good, the Bad and the Ugly in Cybersecurity - Week 46 | ||
Details | Website | 2024-11-15 | 7 | More bugs in Palo Alto Expedition see active exploitation, CISA warns | ||
Details | Website | 2024-11-15 | 26 | Securing the edge: Harnessing Falco's power with Elastic Security for cloud workload protection |