← Back to Explore
T1592.001
Hardware
Adversaries may gather information about the victim's host hardware that can be used during targeting. Information about hardware infrastructure may include a variety of details such as types and versions on specific hosts, as well as the presence of additional components that might be indicative of added defensive protections (ex: card/biometric readers, dedicated encryption hardware, etc.). Adversaries may gather this information in various ways, such as direct collection actions via [Active ...
PRE
1
Detections
1
Sources
0
Threat Actors
BY SOURCE
1splunk_escu
PROCEDURES (1)
Script Execution Monitoring1 detections
Auto-extracted: 1 detections for script execution monitoring