Common Information
Type | Value |
---|---|
Value |
Hardware - T1592.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather information about the victim's host hardware that can be used during targeting. Information about hardware infrastructure may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative of added defensive protections (ex: card/biometric readers, dedicated encryption hardware, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) (ex: hostnames, server banners, user agent strings) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Adversaries may also compromise sites then include malicious content designed to collect host information from visitors.(Citation: ATT ScanBox) Information about the hardware infrastructure may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices). Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Compromise Hardware Supply Chain](https://attack.mitre.org/techniques/T1195/003) or [Hardware Additions](https://attack.mitre.org/techniques/T1200)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-12-22 | 28 | How to Create Your Own Antivirus Tool at Home: A Comprehensive Guide to Android Malware Detection | ||
Details | Website | 2024-12-22 | 0 | Generative AI: Powering a $1.3 Trillion Revolution Across Industries and Ancillary Markets | ||
Details | Website | 2024-12-22 | 3 | U.S. Government Advises Senior Officials to Shift to Encrypted Communications Amid Chinese Cyber… | ||
Details | Website | 2024-12-21 | 1 | BadBox rapidly grows, 190,000 Android devices infected - Security Affairs | ||
Details | Website | 2024-12-21 | 30 | This is the ninth in a series of articles on Broadband Internet | ||
Details | Website | 2024-12-21 | 0 | Why SMBs Need the CIA Triad — Even Without Sensitive Data or On-Prem Systems | ||
Details | Website | 2024-12-21 | 0 | 💰 Boost Your Bottom Line: 5 Tech Solutions | ||
Details | Website | 2024-12-21 | 1 | Quantum-Resistant Encryption Solutions | ||
Details | Website | 2024-12-21 | 0 | Virtualization in Cybersecurity | ||
Details | Website | 2024-12-21 | 0 | Virtualization in Cybersecurity | ||
Details | Website | 2024-12-21 | 8 | What Does Cyber Security Do? The Importance of Cyber Security in Today’s World | ||
Details | Website | 2024-12-21 | 11 | The Evolution of Token-Based Authentication in 2024: Beyond JWT—A Deep Dive into Modern… | ||
Details | Website | 2024-12-21 | 0 | Multi-Factor Authentication Reinforced Security in the Digital Generation | ||
Details | Website | 2024-12-21 | 0 | Network Topologies | ||
Details | Website | 2024-12-21 | 0 | Linux Kernel Programming <char_drive> | ||
Details | Website | 2024-12-21 | 3 | Profiling CSAM Consumers Using Infostealers Data | ||
Details | Website | 2024-12-21 | 0 | Mastering DISA STIG Compliance Made Easy | ||
Details | Website | 2024-12-20 | 0 | Forget Apple & Amazon — Microsoft’s Ecosystem is the Real Power Player for 2030 | ||
Details | Website | 2024-12-20 | 0 | Homelab and Break Things | ||
Details | Website | 2024-12-20 | 0 | Docker: The Bridge Between DevOps and DevSecOps | ||
Details | Website | 2024-12-20 | 31 | This is the eighth in a series of articles on Broadband Internet | ||
Details | Website | 2024-12-20 | 0 | Hardware for SIEM systems | ||
Details | Website | 2024-12-20 | 2 | TryHackMe: Diamond Model (SOC Level 1) | ||
Details | Website | 2024-12-20 | 0 | The OSI Model: A Layered Approach to Networking | ||
Details | Website | 2024-12-20 | 0 | US awards $458m to SK Hynix for chip packaging plant |