Common Information
Type | Value |
---|---|
Value |
Command-Line Interface - T1605 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may use built-in command-line interfaces to interact with the device and execute commands. Android provides a bash shell that can be interacted with over the Android Debug Bridge (ADB) or programmatically using Java’s `Runtime` package. On iOS, adversaries can interact with the underlying runtime shell if the device has been jailbroken. If the device has been rooted or jailbroken, adversaries may locate and invoke a superuser binary to elevate their privileges and interact with the system as the root user. This dangerous level of permissions allows the adversary to run special commands and modify protected system files. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2025-02-11 | 72 | Technical Analysis of Silver Fox Trojan | ||
Details | Website | 2025-02-10 | 2 | Homelab: Configuring OPNSense Firewall | ||
Details | Website | 2025-02-07 | 3 | 🚀 Unlock Your Website’s Full Potential with SiteOne Crawler! | ||
Details | Website | 2025-02-06 | 28 | Windows PowerShell | ||
Details | Website | 2025-02-05 | 4 | Weaponized Go Package Module Let Attackers Gain Remote Access to Infected Systems | ||
Details | Website | 2025-02-04 | 1 | DeepSeek AI tools impersonated by infostealer malware on PyPI - PRSOL:CC | ||
Details | Website | 2025-02-04 | 2 | Bitsight TRACE Systematic Approach: CVE-2024-23897 as a Case Study | Bitsight | ||
Details | Website | 2025-02-03 | 1 | DeepSeek AI tools impersonated by infostealer malware on PyPI | ||
Details | Website | 2025-01-31 | 4 | Brute-force Attack Detection with Wazuh Security Monitoring | ||
Details | Website | 2025-01-28 | 23 | Mastering PowerShell: An Ultra-Extensive Guide to the Top 50 Commands | ||
Details | Website | 2025-01-23 | 164 | The Feed 2025–01–23 | ||
Details | Website | 2025-01-22 | 111 | PlushDaemon compromises supply chain of Korean VPN service | ||
Details | Website | 2025-01-19 | 5 | Command Injection: When Input Becomes a Weapon | ||
Details | Website | 2025-01-19 | 0 | Top 50 Digital Forensics Tools | ||
Details | Website | 2025-01-17 | 25 | 20 Best Threat Hunting Tools — 2025 | ||
Details | Website | 2025-01-16 | 10 | My Journey into Cybersecurity: A Neurodivergent Perspective | ||
Details | Website | 2025-01-16 | 11 | 10-Days of learning — Day 6 — Persistence MalwarePersistence Malware: | ||
Details | Website | 2025-01-15 | 0 | Cybersecurity in Movies: Separating Hollywood Myths from Reality | ||
Details | Website | 2025-01-15 | 2 | Linux Shell Scripting Explained | TryHackme Linux Shells | ||
Details | Website | 2025-01-15 | 2 | Metasploit for Beginners — A Guide to the Powerful Exploitation Framework | ||
Details | Website | 2025-01-14 | 36 | VMware ESXi Logging & Detection Opportunities | ||
Details | Website | 2025-01-14 | 29 | VMware ESXi Logging & Detection Opportunities | ||
Details | Website | 2025-01-14 | 2 | Mass Exploitation Campaign Targets Fortinet Firewalls Using Suspected Zero-Day Vulnerability - CyberSRC | ||
Details | Website | 2025-01-14 | 2 | NPM command confusion | ||
Details | Website | 2025-01-14 | 2 | NPM command confusion |