Common Information
Type | Value |
---|---|
Value |
Hardware - T1592.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather information about the victim's host hardware that can be used during targeting. Information about hardware infrastructure may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative of added defensive protections (ex: card/biometric readers, dedicated encryption hardware, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) (ex: hostnames, server banners, user agent strings) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Adversaries may also compromise sites then include malicious content designed to collect host information from visitors.(Citation: ATT ScanBox) Information about the hardware infrastructure may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices). Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Compromise Hardware Supply Chain](https://attack.mitre.org/techniques/T1195/003) or [Hardware Additions](https://attack.mitre.org/techniques/T1200)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-12-19 | 10 | Mastering Secure Public Wi-Fi Usage: An Ultra-Extensive Guide to Protecting Your Data and Privacy | ||
Details | Website | 2024-12-19 | 0 | Is the Recent Quantum Hype by Google Willow’s Chip a Threat to RSA Algorithm? | ||
Details | Website | 2024-12-19 | 0 | 3-Way Handshake: The Foundation of TCP Communication | ||
Details | Website | 2024-12-19 | 0 | The Importance of Log Monitoring in Cybersecurity | ||
Details | Website | 2024-12-19 | 2 | Europe’s Cyber Resilience Act: A New Era of Cybersecurity for Digital Products | ||
Details | Website | 2024-12-19 | 5 | BadRAM-ifications: A Low-Cost Attack on Trusted Execution Environments | ||
Details | Website | 2024-12-19 | 1 | New Ledger Phishing Campaign Targets Recovery Phrases | ||
Details | Website | 2024-12-19 | 2 | Top 10 Industries Targeted by Threat Actors in 2024 | ||
Details | Website | 2024-12-19 | 0 | Step-by-Step Guide to Setting Up Virtual Machines | ||
Details | Website | 2024-12-19 | 0 | Infostealers Under the Spotlight: What are Infostealers and Why Do You Need to Know? | ||
Details | Website | 2024-12-19 | 40 | The Windows Registry Adventure #5: The regf file format | ||
Details | Website | 2024-12-19 | 0 | Mastering Data Asset Management in the Cloud: A CISO’s Guide to Cyber Resilience | ||
Details | Website | 2024-12-19 | 0 | Updated PCI DSS and PCI PIN compliance packages now available | Amazon Web Services | ||
Details | Website | 2024-12-19 | 0 | Securing Your Digital Assets; BEST PRACTICES | ||
Details | Website | 2024-12-19 | 0 | Iranian Hackers Launched A Massive Attack to Exploit Global ICS Infrastructure | ||
Details | Website | 2024-12-19 | 0 | New Microsoft guidance for the CISA Zero Trust Maturity Model | Microsoft Security Blog | ||
Details | Website | 2024-12-19 | 0 | The Importance of Web Application Firewalls (WAF) in Your Web Security Strategy | ||
Details | Website | 2024-12-19 | 5 | How can I recover my stolen Ethereum, Bitcoin, from a fake investment company? | ||
Details | Website | 2024-12-19 | 0 | Understanding Cybersecurity — Its Importance And Relevancy Today | ||
Details | Website | 2024-12-19 | 2 | Australia’s Formal Embrace of Post-Quantum Cryptography: What Businesses Need to Know | ||
Details | Website | 2024-12-19 | 5 | Fortinet Critical Vulnerabilitiy Let Attackers Inject Commands Remotely | ||
Details | Website | 2024-12-19 | 0 | OWASP TOP 10 2021 | ||
Details | Website | 2024-12-19 | 0 | EU Cyber Resilience Act: Cybersecurity Mandates & Deadlines | ||
Details | Website | 2024-12-19 | 0 | Cybersecurity Tips: Secure Your Online World with Proven Strategies | ||
Details | Website | 2024-12-19 | 0 | How to Protect Your Business from Evolving Cyber Threats in 2025 |