Common Information
Type | Value |
---|---|
Value |
Hardware - T1592.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather information about the victim's host hardware that can be used during targeting. Information about hardware infrastructure may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative of added defensive protections (ex: card/biometric readers, dedicated encryption hardware, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) (ex: hostnames, server banners, user agent strings) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Adversaries may also compromise sites then include malicious content designed to collect host information from visitors.(Citation: ATT ScanBox) Information about the hardware infrastructure may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices). Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Compromise Hardware Supply Chain](https://attack.mitre.org/techniques/T1195/003) or [Hardware Additions](https://attack.mitre.org/techniques/T1200)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-12-23 | 1 | Top 8 Ways To Align Business Value With IT Outcomes Using Cato SASE Cloud | ||
Details | Website | 2024-12-23 | 12 | Introductory Networking: TryHackMe|By Appythecapybara | ||
Details | Website | 2024-12-23 | 4 | Safeguarding Your Digital Assets: The Importance of Cyber Risk Mitigation | ||
Details | Website | 2024-12-23 | 6 | DigiEver IoT Devices Exploited To Deliver Mirai-based Malware | ||
Details | Website | 2024-12-23 | 0 | The Daily Tech Digest: 23 December 2024 | ||
Details | Website | 2024-12-23 | 8 | Peter Shor Broke PKI with Ancient Math, and Futuristic Quantum Computing | ||
Details | Website | 2024-12-23 | 0 | Tutorial: Como Estudar IoT em 2025 e Construir uma Carreira no Futuro da Conexão 🌐📚 | ||
Details | Website | 2024-12-23 | 0 | 5 Common Cybersecurity Mistakes Dubai Companies Make and How to Avoid Them | ||
Details | Website | 2024-12-23 | 2 | The Ultimate Guide to Establishing a Strong Cybersecurity Baseline: Key Steps and Best Practices | ||
Details | Website | 2024-12-23 | 2 | Upgrade Your Old Laptop: Create a Home Server or Cloud with Simple Steps | ||
Details | Website | 2024-12-23 | 4 | Detection Engineering the SOC: Writing a Detection Rule | ||
Details | Website | 2024-12-23 | 22 | Hit-And-Run: A Novel Syscall Method for Bypassing EDRs via VEH and Call Stack Theft | ||
Details | Website | 2024-12-23 | 0 | New Opportunities for Communication Service Providers - Check Point Blog | ||
Details | Website | 2024-12-23 | 9 | Introduction and Installation Guide to Wazuh SIEM | ||
Details | Website | 2024-12-23 | 0 | Is Your USB Cable Secretly Spying on You Using Malicious Hacker Hardware? Here’s How to Check! | ||
Details | Website | 2024-12-23 | 14 | HackTheBox — CrownJewel-2 Sherlock Walkthrough | ||
Details | Website | 2024-12-23 | 0 | 60 of our biggest AI announcements in 2024 | ||
Details | Website | 2024-12-22 | 0 | What’s hiding in your SPI Flash | ||
Details | Website | 2024-12-22 | 0 | Diving into Cybersecurity: A Comprehensive Beginner’s Guide | ||
Details | Website | 2024-12-22 | 5 | BroadLink RM4 Pro in Home Assistant Without the App | ||
Details | Website | 2024-12-22 | 0 | “The Rise of Quantum Computing: What It Means for the Future of Technology” | ||
Details | Website | 2024-12-22 | 0 | Cryptocurrency and Cybersecurity: Safe Online | ||
Details | Website | 2024-12-22 | 22 | TryHackMe: MITRE (SOC Level 1) | ||
Details | Website | 2024-12-22 | 0 | Technology refers to the application of scientific knowledge, tools, methods, and systems to solve… | ||
Details | Website | 2024-12-22 | 0 | Securing the Future: Addressing Cybersecurity Risks in 5G Networks |