Common Information
Type | Value |
---|---|
Value |
Hardware - T1592.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather information about the victim's host hardware that can be used during targeting. Information about hardware infrastructure may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative of added defensive protections (ex: card/biometric readers, dedicated encryption hardware, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) (ex: hostnames, server banners, user agent strings) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Adversaries may also compromise sites then include malicious content designed to collect host information from visitors.(Citation: ATT ScanBox) Information about the hardware infrastructure may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices). Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Compromise Hardware Supply Chain](https://attack.mitre.org/techniques/T1195/003) or [Hardware Additions](https://attack.mitre.org/techniques/T1200)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2015-09-10 | 2 | Cloud security controls series: Encrypting Data at Rest - Microsoft Security Blog | ||
Details | Website | 2015-09-09 | 3 | Factoring RSA Keys With TLS Perfect Forward Secrecy | ||
Details | Website | 2015-09-09 | 103 | Satellite Turla: APT Command and Control in the Sky | ||
Details | Website | 2015-09-07 | 2 | Kernel bypass | ||
Details | Website | 2015-09-04 | 2 | Supposed Rooting Tool Offers Survey, PUP | Malwarebytes Labs | ||
Details | Website | 2015-09-02 | 2 | A layman’s dictionary: RAT | ||
Details | Website | 2015-09-01 | 0 | Replacing RSA SecurID: Why Are Customers Switching? | ||
Details | Website | 2015-09-01 | 0 | Rambus secures next-gen digital video content | ||
Details | Website | 2015-08-31 | 5 | LLVM Weekly - #87, Aug 31st 2015 | ||
Details | Website | 2015-08-26 | 0 | The Internet has Upgraded to HTTP/2, but One Key Feature will Slow You Down | Radware Blog | ||
Details | Website | 2015-08-24 | 4 | 2015-08-21 Librem 13: Weekly BIOS Progress Update – Purism | ||
Details | Website | 2015-08-24 | 0 | Just What Exactly is DevOps? | Network Wrangler - Tech Blog | ||
Details | Website | 2015-08-17 | 0 | IBM, Aspera Transfer Network Lessons to Wider Markets | ||
Details | Website | 2015-08-17 | 0 | The Endpoint: A Leading Security Concern | ||
Details | Website | 2015-08-16 | 0 | Better Keep It Open or Closed? | ||
Details | Website | 2015-08-16 | 0 | Better Keep It Open or Closed? | ||
Details | Website | 2015-08-14 | 2 | 2015-08-14: Librem 13: Weekly BIOS Progress Update – Purism | ||
Details | Website | 2015-08-14 | 2 | Sysadmin Linkfest: Rnd edition | ||
Details | Website | 2015-08-12 | 1 | Security Week 32: Android Stagefright, new car hacks, Do Not Track 2.0 and more | ||
Details | Website | 2015-08-12 | 0 | Securing ultra-low-power devices | ||
Details | Website | 2015-08-11 | 0 | BlackBerry Password Keeper Escrow Key: Have We Just Found a Hidden Backdoor? | ||
Details | Website | 2015-08-06 | 1 | When To Use Containers Or Virtual Machines, And Why | ||
Details | Website | 2015-08-05 | 0 | JVM guaranteed safepoints | ||
Details | Website | 2015-08-04 | 0 | IP-Box – Why a 4 digit passcode is still a bad idea – Compass Security Blog | ||
Details | Website | 2015-08-01 | 38 | EFI Byte Code |