Sniffing data with Rogue Access Point
Tags
maec-delivery-vectors: | Watering Hole |
attack-pattern: | Data Direct Dns Server - T1583.002 Dns Server - T1584.002 Phishing - T1660 Phishing - T1566 Server - T1583.004 Server - T1584.004 Sudo - T1169 |
Common Information
Type | Value |
---|---|
UUID | 523bb91c-e8e1-400d-8cf0-0ffdda2b7194 |
Fingerprint | b4a3dd5b01b25ad1 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Aug. 2, 2023, 8:25 a.m. |
Added to db | Aug. 2, 2023, 10:30 a.m. |
Last updated | Nov. 17, 2024, 12:54 p.m. |
Headline | Sniffing data with Rogue Access Point |
Title | Sniffing data with Rogue Access Point |
Detected Hints/Tags/Attributes | 34/2/12 |
Source URLs
URL Provider
RSS Feed
Details | Id | Enabled | Feed title | Url | Added to db |
---|---|---|---|---|---|
Details | 167 | ✔ | Cybersecurity on Medium | https://medium.com/feed/tag/cybersecurity | 2024-08-30 22:08 |
Details | 168 | ✔ | Infosec on Medium | https://medium.com/feed/tag/infosec | 2024-08-30 22:08 |
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 2 | iguru.zip |
|
Details | Domain | 1 | www.iguru.gr |
|
Details | Domain | 1 | way2sms.com |
|
Details | File | 2 | iguru.zip |
|
Details | IPv4 | 56 | 192.168.1.2 |
|
Details | IPv4 | 5 | 192.168.1.30 |
|
Details | IPv4 | 141 | 255.255.255.0 |
|
Details | IPv4 | 262 | 192.168.1.1 |
|
Details | IPv4 | 295 | 8.8.8.8 |
|
Details | IPv4 | 1 | 192.68.1.1 |
|
Details | IPv4 | 103 | 192.168.1.0 |
|
Details | Url | 1 | https://www.iguru.gr/wp-content/uploads/2018/07/iguru.zip |