Common Information
Type Value
Value
Hardware - T1592.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may gather information about the victim's host hardware that can be used during targeting. Information about hardware infrastructure may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative of added defensive protections (ex: card/biometric readers, dedicated encryption hardware, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) (ex: hostnames, server banners, user agent strings) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Adversaries may also compromise sites then include malicious content designed to collect host information from visitors.(Citation: ATT ScanBox) Information about the hardware infrastructure may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices). Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Compromise Hardware Supply Chain](https://attack.mitre.org/techniques/T1195/003) or [Hardware Additions](https://attack.mitre.org/techniques/T1200)).
Details Published Attributes CTI Title
Details Website 2754-08-03 37 Virus Bulletin :: VB2018 paper: Unpacking the packed unpacker: reversing an Android anti-analysis native library
Details Website 2574-01-02 0 Editors Picks, Apps We Recommend | TechSpot
Details Website 2083-07-04 9 SonicWall VPN Portal Critical Flaw (CVE-2020-5135)
Details Website 2031-03-19 15 HPSBHF03564 rev 2 - Synaptics Touchpad Driver Potential, Local Loss of Confidentiality | HP® Customer Support
Details Website 2025-11-07 1 Vault7 - Home
Details Website 2024-12-28 0 BRICKED SSD ON LIFE SUPPORT — FMADIO
Details Website 2024-12-11 16 Mastering Third-Party Risk Management: A Comprehensive Guide to Mitigating Supply Chain Threats
Details Website 2024-12-11 8 Need Passwordless Authentication? Implement FIDO2 for Better Security in Your Java SpringBoot App!
Details Website 2024-12-11 0 Why Zenarmor 1.18 is a Game-Changer in Boosting Revenue for MSPs and MSSPs
Details Website 2024-12-11 0 Foundation of IT Knowledge: A Beginner’s Guide
Details Website 2024-12-11 0 Passing Network+
Details Website 2024-12-11 0 5 Dangerous Hacking Devices That Hackers Use Most
Details Website 2024-12-11 43 Microsoft Patch Tuesday, December 2024 Security Update Review – Qualys ThreatPROTECT
Details Website 2024-12-11 25 FK_Undead Loader IOCs - SEC-1275-1
Details Website 2024-12-10 0 Understanding Key Terminologies in Cybersecurity: A Beginner’s Guide
Details Website 2024-12-10 24 Microsoft Patch Tuesday for December 2024 contains four critical vulnerabilities
Details Website 2024-12-10 76 Patch Tuesday - December 2024 | Rapid7 Blog
Details Website 2024-12-10 2 TryHackMe, Windows Fundamentals (Part III)
Details Website 2024-12-10 11 TryHackMe, Windows Fundamentals (Part II)
Details Website 2024-12-10 0 Scalability in Cloud Computing- Gigamon Blog
Details Website 2024-12-10 0 Network 101 — Part1
Details Website 2024-12-10 1 Post-Quantum Cryptography: The Implications of Google’s Willow and Other Quantum Computers for Cybersecurity
Details Website 2024-12-10 24 Microsoft Patch Tuesday for December 2024 contains four critical vulnerabilities
Details Website 2024-12-10 0 You Know Less About Yourself Than the Internet Does
Details Website 2024-12-10 1 OpenWrt’s Attended SysUpgrade (ASU) Vulnerability Exposes Routers to Malicious Firmware Attacks - SOCRadar® Cyber Intelligence Inc.