Pentesting results for 2023
Tags
cmtmf-attack-pattern: Command And Scripting Interpreter Exploit Public-Facing Application
country: Russia
attack-pattern: Data Abuse Elevation Control Mechanism - T1626 Abuse Elevation Control Mechanism - T1548 Command And Scripting Interpreter - T1623 Credentials - T1589.001 Data Destruction - T1662 Data Destruction - T1485 Dcsync - T1003.006 Domain Account - T1087.002 Domain Account - T1136.002 Domain Accounts - T1078.002 Domain Groups - T1069.002 Domains - T1583.001 Domains - T1584.001 Email Account - T1087.003 Exploitation For Privilege Escalation - T1404 Exploit Public-Facing Application - T1377 Exploits - T1587.004 Exploits - T1588.005 File And Directory Discovery - T1420 Local Account - T1087.001 Local Account - T1136.001 Local Accounts - T1078.003 System Network Configuration Discovery - T1422 Lsa Secrets - T1003.004 Lsass Memory - T1003.001 System Information Discovery - T1426 Ntds - T1003.003 Pass The Hash - T1550.002 Password Cracking - T1110.002 Password Guessing - T1110.001 Password Managers - T1555.005 Password Spraying - T1110.003 Server - T1583.004 Server - T1584.004 Server Software Component - T1505 Software - T1592.002 Ssh - T1021.004 Windows Command Shell - T1059.003 Unix Shell - T1059.004 Web Shell - T1505.003 Vulnerabilities - T1588.006 Unix Shell - T1623.001 Account Discovery - T1087 Account Manipulation - T1098 Brute Force - T1110 Command-Line Interface - T1059 Create Account - T1136 Credential Dumping - T1003 Exploit Public-Facing Application - T1190 Exploitation For Privilege Escalation - T1068 External Remote Services - T1133 File And Directory Discovery - T1083 Pass The Hash - T1075 Permission Groups Discovery - T1069 Remote System Discovery - T1018 Third-Party Software - T1072 System Information Discovery - T1082 System Network Configuration Discovery - T1016 System Owner/User Discovery - T1033 Valid Accounts - T1078 Web Shell - T1100 Data Destruction Exploit Public-Facing Application External Remote Services Remote System Discovery Valid Accounts
Common Information
Type Value
UUID 622385a9-4111-445c-9e07-f26eb17cca9f
Fingerprint 95312d9844e75247
Analysis status DONE
Considered CTI value 2
Text language
Published July 2, 2024, midnight
Added to db Aug. 31, 2024, 9:51 a.m.
Last updated Nov. 15, 2024, 12:41 p.m.
Headline Pentesting results for 2023
Title Pentesting results for 2023
Detected Hints/Tags/Attributes 119/3/5
RSS Feed
Attributes
Details Type #Events CTI Value
Details CVE 127
cve-2022-41082
Details CVE 5
cve-2022-27228
Details CVE 105
cve-2022-41040
Details CVE 60
cve-2021-4034
Details CVE 50
cve-2022-41080