Program Download

Description

Adversaries may perform a program download to transfer a user program to a controller.

Products, Sensors, and Dependencies

ProductDependenciesData sourceAccess requiredProtocolData CollectedNotes
Tenable Vulnerability ManagementAdvanced Network ScanNetwork scans and trafficDepends on the vendorActive Connections to controller on management port
Tenable OT SecurityNetwork scans and trafficDepends on the vendorActive Connections to controller on management port

Attack Path Technique Details

Framework: MITRE ATT&CK

Family: Lateral Movement

Technique: Program Download