test_scratch / cti-ATT-CK-v13.1 /mobile-attack /attack-pattern /attack-pattern--2de38279-043e-47e8-aaad-1b07af6d0790.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
2.3 kB
{
"type": "bundle",
"id": "bundle--d64dd489-ad2a-4e58-9b1b-70557f581651",
"spec_version": "2.0",
"objects": [
{
"x_mitre_platforms": [
"Android",
"iOS"
],
"x_mitre_domains": [
"mobile-attack"
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"type": "attack-pattern",
"id": "attack-pattern--2de38279-043e-47e8-aaad-1b07af6d0790",
"created": "2017-10-25T14:48:26.890Z",
"x_mitre_version": "1.1",
"external_references": [
{
"source_name": "mitre-attack",
"external_id": "T1423",
"url": "https://attack.mitre.org/techniques/T1423"
}
],
"x_mitre_deprecated": false,
"revoked": false,
"description": "Adversaries may attempt to get a listing of services running on remote hosts, including those that may be vulnerable to remote software exploitation. Methods to acquire this information include port scans and vulnerability scans from the mobile device. This technique may take advantage of the mobile device's access to an internal enterprise network either through local connectivity or through a Virtual Private Network (VPN).",
"modified": "2022-04-11T19:12:38.451Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"name": "Network Service Scanning",
"x_mitre_detection": "Network service scanning can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversarial behavior.",
"kill_chain_phases": [
{
"phase_name": "discovery",
"kill_chain_name": "mitre-mobile-attack"
}
],
"x_mitre_is_subtechnique": false,
"x_mitre_tactic_type": [
"Post-Adversary Device Access"
],
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5"
}
]
}