Common Information
Type | Value |
---|---|
Value |
Vulnerability Scanning - T1595.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may scan victims for vulnerabilities that can be used during targeting. Vulnerability scans typically check if the configuration of a target host/application (ex: software and version) potentially aligns with the target of a specific exploit the adversary may seek to use. These scans may also include more broad attempts to [Gather Victim Host Information](https://attack.mitre.org/techniques/T1592) that can be used to identify more commonly known, exploitable vulnerabilities. Vulnerability scans typically harvest running software and version numbers via server banners, listening ports, or other network artifacts.(Citation: OWASP Vuln Scanning) Information from these scans may reveal opportunities for other forms of reconnaissance (ex: [Search Open Websites/Domains](https://attack.mitre.org/techniques/T1593) or [Search Open Technical Databases](https://attack.mitre.org/techniques/T1596)), establishing operational resources (ex: [Develop Capabilities](https://attack.mitre.org/techniques/T1587) or [Obtain Capabilities](https://attack.mitre.org/techniques/T1588)), and/or initial access (ex: [Exploit Public-Facing Application](https://attack.mitre.org/techniques/T1190)). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-16 | 90 | From Royal to BlackSuit: Understanding the Tactics and Impact of a Sophisticated Ransomware Strain | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-16 | 4 | External Pentest Command Checklist/Cheat sheet (Windows) | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 0 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 0 | Solid Security Pro Review | ||
Details | Website | 2024-11-16 | 1 | The Ultimate Cybersecurity Study Guide: Your Roadmap to Mastery | ||
Details | Website | 2024-11-16 | 0 | Web Security Automation: Your Shield Against Cyber Threats | ||
Details | Website | 2024-11-16 | 0 | Understanding Hacking, Virtual Machines, Linux, and Networking: A Comprehensive Guide | ||
Details | Website | 2024-11-16 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-15 | 0 | Is your cybersecurity really covering all the bases? | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-15 | 0 | Solid Security Pro existing site review | ||
Details | Website | 2024-11-15 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-15 | 5 | How Runtime Insights Help with Container Security | ||
Details | Website | 2024-11-15 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-15 | 38 | Dark Web Profile: Cadet Blizzard | ||
Details | Website | 2024-11-15 | 12 | Ivanti Cloud Services Appliance Hacked! | CVE-20248963 | Live Bug | ||
Details | Website | 2024-11-15 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-15 | 1 | Solid Security Pro Overview review | ||
Details | Website | 2024-11-15 | 1 | How Runtime Insights Help with Container Security | ||
Details | Website | 2024-11-14 | 0 | Palo Alto Networks Issues AI Red Alert | ||
Details | Website | 2024-11-14 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-14 | 1 | Solid Security Pro Review | ||
Details | Website | 2024-11-14 | 0 | 2025 Predictions — How One Year Will Redefine the Cybersecurity Industry | ||
Details | Website | 2024-11-14 | 0 | Mastering SAST vs. DAST: An In-Depth Guide to Application Security Testing | ||
Details | Website | 2024-11-14 | 0 | Why Cybersecurity in Channel Partnerships Matters More Than Ever? |