Common Information
Type Value
Value
Hardware - T1592.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may gather information about the victim's host hardware that can be used during targeting. Information about hardware infrastructure may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative of added defensive protections (ex: card/biometric readers, dedicated encryption hardware, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) (ex: hostnames, server banners, user agent strings) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Adversaries may also compromise sites then include malicious content designed to collect host information from visitors.(Citation: ATT ScanBox) Information about the hardware infrastructure may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices). Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Compromise Hardware Supply Chain](https://attack.mitre.org/techniques/T1195/003) or [Hardware Additions](https://attack.mitre.org/techniques/T1200)).
Details Published Attributes CTI Title
Details Website 2015-09-10 2 Cloud security controls series: Encrypting Data at Rest - Microsoft Security Blog
Details Website 2015-09-09 3 Factoring RSA Keys With TLS Perfect Forward Secrecy
Details Website 2015-09-09 103 Satellite Turla: APT Command and Control in the Sky
Details Website 2015-09-07 2 Kernel bypass
Details Website 2015-09-04 2 Supposed Rooting Tool Offers Survey, PUP | Malwarebytes Labs
Details Website 2015-09-02 2 A layman’s dictionary: RAT
Details Website 2015-09-01 0 Replacing RSA SecurID: Why Are Customers Switching?
Details Website 2015-09-01 0 Rambus secures next-gen digital video content
Details Website 2015-08-31 5 LLVM Weekly - #87, Aug 31st 2015
Details Website 2015-08-26 0 The Internet has Upgraded to HTTP/2, but One Key Feature will Slow You Down | Radware Blog
Details Website 2015-08-24 4 2015-08-21 Librem 13: Weekly BIOS Progress Update – Purism
Details Website 2015-08-24 0 Just What Exactly is DevOps? | Network Wrangler - Tech Blog
Details Website 2015-08-17 0 IBM, Aspera Transfer Network Lessons to Wider Markets
Details Website 2015-08-17 0 The Endpoint: A Leading Security Concern
Details Website 2015-08-16 0 Better Keep It Open or Closed?
Details Website 2015-08-16 0 Better Keep It Open or Closed?
Details Website 2015-08-14 2 2015-08-14: Librem 13: Weekly BIOS Progress Update – Purism
Details Website 2015-08-14 2 Sysadmin Linkfest: Rnd edition
Details Website 2015-08-12 1 Security Week 32: Android Stagefright, new car hacks, Do Not Track 2.0 and more
Details Website 2015-08-12 0 Securing ultra-low-power devices
Details Website 2015-08-11 0 BlackBerry Password Keeper Escrow Key: Have We Just Found a Hidden Backdoor?
Details Website 2015-08-06 1 When To Use Containers Or Virtual Machines, And Why
Details Website 2015-08-05 0 JVM guaranteed safepoints
Details Website 2015-08-04 0 IP-Box – Why a 4 digit passcode is still a bad idea – Compass Security Blog
Details Website 2015-08-01 38 EFI Byte Code