Common Information
Type | Value |
---|---|
Value |
Hardware - T1592.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may gather information about the victim's host hardware that can be used during targeting. Information about hardware infrastructure may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative of added defensive protections (ex: card/biometric readers, dedicated encryption hardware, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active Scanning](https://attack.mitre.org/techniques/T1595) (ex: hostnames, server banners, user agent strings) or [Phishing for Information](https://attack.mitre.org/techniques/T1598). Adversaries may also compromise sites then include malicious content designed to collect host information from visitors.(Citation: ATT ScanBox) Information about the hardware infrastructure may also be exposed to adversaries via online or other accessible data sets (ex: job postings, network maps, assessment reports, resumes, or purchase invoices). Gathering this information may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Compromise Hardware Supply Chain](https://attack.mitre.org/techniques/T1195/003) or [Hardware Additions](https://attack.mitre.org/techniques/T1200)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-12-18 | 0 | Scaling New Heights: The Evolutionary Role of Infrastructure Management Services | ||
Details | Website | 2024-12-18 | 3 | WISeKey and SEALSQ: A Shield for the Digital World in the Quantum Revolution Era | ||
Details | Website | 2024-12-18 | 2 | How can you Safeguarding Your Crypto Wallet? | ||
Details | Website | 2024-12-18 | 0 | Stop Being Confused About Tor Relays | ||
Details | Website | 2024-12-18 | 1 | Securing Turbine Data: Blockchain and Advanced Cybersecurity Measures in the Energy Sector | ||
Details | Website | 2024-12-18 | 4 | How to Lose a Fortune with Just One Bad Click – Krebs on Security | ||
Details | Website | 2024-12-18 | 0 | McAfee Mobile Security Review: Protect Your Data with Ease | ||
Details | Website | 2024-12-18 | 0 | Samsung and Google debut Gemini AI in XR headset | ||
Details | Website | 2024-12-18 | 0 | Beyond the Basics: Advanced Features Every Web Hosting Provider Should Offer in 2025 | ||
Details | Website | 2024-12-18 | 6 | Python & Network Automation | ||
Details | Website | 2024-12-18 | 0 | Over 300K Prometheus Instances Exposed: Credentials and API Keys Leaking Online - CyberSRC | ||
Details | Website | 2024-12-18 | 4 | Self-cultivation of security architects: from principles to practice | ||
Details | Website | 2024-12-18 | 2 | Cybersecurity: How to Protect Yourself and Your Data. A Beginner’s Guide | ||
Details | Website | 2024-12-18 | 23 | Enumeration: The Key to Finding and Exploiting Vulnerabilities | ||
Details | Website | 2024-12-18 | 95 | [Guest Diary] A Deep Dive into TeamTNT and Spinning YARN - SANS Internet Storm Center | ||
Details | Website | 2024-12-18 | 10 | Responding to Adversary in the Middle attacks | ||
Details | Website | 2024-12-18 | 0 | How to Prevent Hacking During the Holiday Season | ||
Details | Website | 2024-12-18 | 0 | Announcing SPARROW: A Breakthrough AI Tool to Measure and Protect Earth’s Biodiversity in the Most Remote Places | ||
Details | Website | 2024-12-18 | 1 | CISA urges switch to Signal-like encrypted messaging apps after telecom hacks | ||
Details | Website | 2024-12-18 | 0 | CISA pushes guide for high-value targets to secure mobile devices | ||
Details | Website | 2024-12-17 | 0 | Enhance Vulnerability Management with Flashpoint's ATT&CK Mapping | ||
Details | Website | 2024-12-17 | 0 | The Great Debate: Android or iPhone? | ||
Details | Website | 2024-12-17 | 0 | Zivilgesellschaft macht Druck beim Einhegen der Hackerparagrafen | ||
Details | Website | 2024-12-17 | 0 | The Impact of 5G on Cybersecurity | ||
Details | Website | 2024-12-17 | 0 | Hacking Digital License Plates - Schneier on Security |