Common Information
Type | Value |
---|---|
Value |
Hardware - T1592.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather information about the victim's host hardware that can be used during targeting. Information about hardware infrastructure may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative of added defensive protections (ex: card/biometric readers, dedicated encryption hardware, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) (ex: hostnames, server banners, user agent strings) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Adversaries may also compromise sites then include malicious content designed to collect host information from visitors.(Citation: ATT ScanBox) Information about the hardware infrastructure may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices). Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Compromise Hardware Supply Chain](https://attack.mitre.org/techniques/T1195/003) or [Hardware Additions](https://attack.mitre.org/techniques/T1200)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-12-20 | 0 | OSI Model Explanation | ||
Details | Website | 2024-12-20 | 7 | SAML (Security Assertion Markup Language): A Comprehensive Guide | ||
Details | Website | 2024-12-20 | 3 | Emmenhtal: Malware Overview | ||
Details | Website | 2024-12-20 | 0 | Choosing the Right System Integration Partner: A Step-by-Step Checklist | ||
Details | Website | 2024-12-20 | 0 | Cybersecurity Alert: U.S. Considers Ban on TP-Link Over Security Risks | ||
Details | Website | 2024-12-20 | 8 | Utilizing machine learning to collect more subdomains using subwiz | ||
Details | Website | 2024-12-20 | 0 | Harnessing AI to Enhance Cybersecurity in Edge Computing | ||
Details | Website | 2024-12-20 | 0 | 1-Year Diploma Course in Cyber Security Training in Delhi | ||
Details | Website | 2024-12-20 | 12 | CISA Releases Eight new ICS Advisories to Defend Cyber Attacks | ||
Details | Website | 2024-12-20 | 1 | NotLockBit - Previously Unknown Ransomware Attack Windows & macOS | ||
Details | Website | 2024-12-20 | 3 | What is Security Testing? A Beginner’s Guide | ||
Details | Website | 2024-12-20 | 6 | Analyzing UPX Packer Part 1 | ||
Details | Website | 2024-12-20 | 0 | Zero-Trust in Web3: Redefining Security for Decentralized Systems | ||
Details | Website | 2024-12-20 | 1 | Fake Sponsorship Emails Are Targeting YouTube Creators | ||
Details | Website | 2024-12-20 | 0 | North Korean Hackers Responsible for 61% of All Crypto Thefts in 2024, Analysis Finds | ||
Details | Website | 2024-12-20 | 5 | Malicious Rspack, Vant packages published using stolen NPM tokens | ||
Details | Website | 2024-12-19 | 0 | Advanced Data Security and Reliability | ||
Details | Website | 2024-12-19 | 14 | Welcome to the party, pal! | ||
Details | Website | 2024-12-19 | 0 | The year in review: Delivering simplicity, productivity, reliability, and security with AI-Native Networking | Official Juniper Networks Blogs | ||
Details | Website | 2024-12-19 | 3 | BadRAM-ifications: A Low-Cost Attack on Trusted Execution Environments | ||
Details | Website | 2024-12-19 | 0 | Understanding Zero Trust: Redefining Cybersecurity for the Modern Era | ||
Details | Website | 2024-12-19 | 2 | CISO Challenges for 2025: Overcoming Cybersecurity Complexities | ||
Details | Website | 2024-12-19 | 35 | The KillNet Attacks on Healthcare — Top 10 Defenses to Protect your Organization | ||
Details | Website | 2024-12-19 | 0 | Five technology trends to watch in 2025 | ||
Details | Website | 2024-12-19 | 21 | Welcome to the party, pal! |