Common Information
Type Value
Value
Hardware - T1592.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may gather information about the victim's host hardware that can be used during targeting. Information about hardware infrastructure may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative of added defensive protections (ex: card/biometric readers, dedicated encryption hardware, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) (ex: hostnames, server banners, user agent strings) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Adversaries may also compromise sites then include malicious content designed to collect host information from visitors.(Citation: ATT ScanBox) Information about the hardware infrastructure may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices). Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Compromise Hardware Supply Chain](https://attack.mitre.org/techniques/T1195/003) or [Hardware Additions](https://attack.mitre.org/techniques/T1200)).
Details Published Attributes CTI Title
Details Website 2024-12-23 1 Top 8 Ways To Align Business Value With IT Outcomes Using Cato SASE Cloud
Details Website 2024-12-23 12 Introductory Networking: TryHackMe|By Appythecapybara
Details Website 2024-12-23 4 Safeguarding Your Digital Assets: The Importance of Cyber Risk Mitigation
Details Website 2024-12-23 6 DigiEver IoT Devices Exploited To Deliver Mirai-based Malware
Details Website 2024-12-23 0 The Daily Tech Digest: 23 December 2024
Details Website 2024-12-23 8 Peter Shor Broke PKI with Ancient Math, and Futuristic Quantum Computing
Details Website 2024-12-23 0 Tutorial: Como Estudar IoT em 2025 e Construir uma Carreira no Futuro da Conexão 🌐📚
Details Website 2024-12-23 0 5 Common Cybersecurity Mistakes Dubai Companies Make and How to Avoid Them
Details Website 2024-12-23 2 The Ultimate Guide to Establishing a Strong Cybersecurity Baseline: Key Steps and Best Practices
Details Website 2024-12-23 2 Upgrade Your Old Laptop: Create a Home Server or Cloud with Simple Steps
Details Website 2024-12-23 4 Detection Engineering the SOC: Writing a Detection Rule
Details Website 2024-12-23 22 Hit-And-Run: A Novel Syscall Method for Bypassing EDRs via VEH and Call Stack Theft
Details Website 2024-12-23 0 New Opportunities for Communication Service Providers - Check Point Blog
Details Website 2024-12-23 9 Introduction and Installation Guide to Wazuh SIEM
Details Website 2024-12-23 0 Is Your USB Cable Secretly Spying on You Using Malicious Hacker Hardware? Here’s How to Check!
Details Website 2024-12-23 14 HackTheBox — CrownJewel-2 Sherlock Walkthrough
Details Website 2024-12-23 0 60 of our biggest AI announcements in 2024
Details Website 2024-12-22 0 What’s hiding in your SPI Flash
Details Website 2024-12-22 0 Diving into Cybersecurity: A Comprehensive Beginner’s Guide
Details Website 2024-12-22 5 BroadLink RM4 Pro in Home Assistant Without the App
Details Website 2024-12-22 0 “The Rise of Quantum Computing: What It Means for the Future of Technology”
Details Website 2024-12-22 0 Cryptocurrency and Cybersecurity: Safe Online
Details Website 2024-12-22 22 TryHackMe: MITRE (SOC Level 1)
Details Website 2024-12-22 0 Technology refers to the application of scientific knowledge, tools, methods, and systems to solve…
Details Website 2024-12-22 0 Securing the Future: Addressing Cybersecurity Risks in 5G Networks