Common Information
Type Value
Value
Command-Line Interface - T1605
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may use built-in command-line interfaces to interact with the device and execute commands. Android provides a bash shell that can be interacted with over the Android Debug Bridge (ADB) or programmatically using Java’s `Runtime` package. On iOS, adversaries can interact with the underlying runtime shell if the device has been jailbroken. If the device has been rooted or jailbroken, adversaries may locate and invoke a superuser binary to elevate their privileges and interact with the system as the root user. This dangerous level of permissions allows the adversary to run special commands and modify protected system files.
Details Published Attributes CTI Title
Details Website 2025-02-11 72 Technical Analysis of Silver Fox Trojan
Details Website 2025-02-10 2 Homelab: Configuring OPNSense Firewall
Details Website 2025-02-07 3 🚀 Unlock Your Website’s Full Potential with SiteOne Crawler!
Details Website 2025-02-06 28 Windows PowerShell
Details Website 2025-02-05 4 Weaponized Go Package Module Let Attackers Gain Remote Access to Infected Systems
Details Website 2025-02-04 1 DeepSeek AI tools impersonated by infostealer malware on PyPI - PRSOL:CC
Details Website 2025-02-04 2 Bitsight TRACE Systematic Approach: CVE-2024-23897 as a Case Study | Bitsight
Details Website 2025-02-03 1 DeepSeek AI tools impersonated by infostealer malware on PyPI
Details Website 2025-01-31 4 Brute-force Attack Detection with Wazuh Security Monitoring
Details Website 2025-01-28 23 Mastering PowerShell: An Ultra-Extensive Guide to the Top 50 Commands
Details Website 2025-01-23 164 The Feed 2025–01–23
Details Website 2025-01-22 111 PlushDaemon compromises supply chain of Korean VPN service
Details Website 2025-01-19 5 Command Injection: When Input Becomes a Weapon
Details Website 2025-01-19 0 Top 50 Digital Forensics Tools
Details Website 2025-01-17 25 20 Best Threat Hunting Tools — 2025
Details Website 2025-01-16 10 My Journey into Cybersecurity: A Neurodivergent Perspective
Details Website 2025-01-16 11 10-Days of learning — Day 6 — Persistence MalwarePersistence Malware:
Details Website 2025-01-15 0 Cybersecurity in Movies: Separating Hollywood Myths from Reality
Details Website 2025-01-15 2 Linux Shell Scripting Explained | TryHackme Linux Shells
Details Website 2025-01-15 2 Metasploit for Beginners — A Guide to the Powerful Exploitation Framework
Details Website 2025-01-14 36 VMware ESXi Logging & Detection Opportunities
Details Website 2025-01-14 29 VMware ESXi Logging & Detection Opportunities
Details Website 2025-01-14 2 Mass Exploitation Campaign Targets Fortinet Firewalls Using Suspected Zero-Day Vulnerability - CyberSRC
Details Website 2025-01-14 2 NPM command confusion
Details Website 2025-01-14 2 NPM command confusion