Firmware reconnaissance involves attackers gathering information about a target's device firmware, the low-level software controlling hardware, to identify vulnerabilities, plan tailored exploits, and understand the victim's infrastructure before launching an attack.
ATT&CK ID T1592.003
Tactics Reconnaissance
Platforms PRE (Pre-attack)
Difficulty 🟡 Medium
Prevalence High
Imagine a modern office building. The hardware is the physical structure, walls, elevators, HVAC system. The operating system (like Windows) is the building manager who tells people which floor to go to. The firmware is the silent, unseen control system in the basement: it dictates how the elevator motors actually work, how the security locks engage, and how the power is distributed.
Firmware reconnaissance is like a thief casing that building by first studying the technical schematics of its control systems. They're not trying to break in yet. They're figuring out if the elevator is from a manufacturer known for faulty brakes, or if the electronic locks run on outdated, hackable software.
In the digital world, attackers perform firmware reconnaissance to catalog the types of BIOS, UEFI, network card, or hard drive controller firmware in your organization. This information is gold for planning sophisticated attacks that can bypass traditional OS-level defenses.
| Term | Definition | Why It Matters |
|---|---|---|
| Firmware | Permanent software programmed into a hardware device's read-only memory (ROM). It provides low-level control for the device's specific hardware. | It's the primary target. Compromising firmware can give an attacker deep, persistent control that survives OS reinstalls. |
| UEFI/BIOS | Unified Extensible Firmware Interface (UEFI) or Basic Input/Output System (BIOS). The firmware that initializes hardware during the boot process before loading the OS. | The crown jewels of system firmware. A compromise here can infect every OS boot. |
| Hardware Inventory | A detailed list of all hardware assets in an organization, including make, model, and firmware versions. | The attacker's shopping list. Your lack of one is their advantage. |
| CVE (Common Vulnerabilities and Exposures) | A publicly listed catalog of known security vulnerabilities, each with a unique identifier (e.g., CVE-2023-1234). | Attackers cross-reference your firmware versions with CVEs to find unpatched exploits. |
| SBOM (Software Bill of Materials) | A nested inventory of software and firmware components, detailing their relationships and dependencies. | A defensive tool to track vulnerable firmware components across your enterprise. |
This reconnaissance is methodical and often automated. It typically occurs early in the Cyber Kill Chain, during the Reconnaissance and Weaponization phases.
Think of yourself as a military intelligence officer planning a raid. You wouldn't just study the enemy's troop movements (network traffic); you'd obtain the blueprints for their fortress walls (firmware). Is the wall (firewall firmware) made of brick (updated) or old, cracked mortar (vulnerable version 1.2.3)? This intelligence dictates whether you bring a ladder or C4 explosives.
The red teamer's mindset is: "Assume the target is running vulnerable firmware somewhere. My job is to find out where, and what exploit fits that lock." The goal is efficiency, why try 100 different malware samples when one precise firmware exploit will do?
Attackers use a blend of specialized scanners and broad internet-wide search engines.
banner.nse or http-enum.nse can grab version information from services that may leak firmware data.scanner/http/title or vendor-specific scanners can enumerate web interfaces on embedded devices (routers, cameras) that display firmware versions.Example Command (Passive - Shodan CLI):
# Search Shodan for a specific organization's netblock running a vulnerable Cisco IOS version shodan search net:"192.0.2.0/24" product:"Cisco IOS" version:"15.1\(4\)M4" # Result will show IPs, banners, and potential firmware details.
Example Command (Active - Nmap):
# Nmap scan targeting common embedded web ports that often display firmware info nmap -sV --script=http-enum,http-title -p80,443,8080,8443 <target_ip> # The 'http-title' script might reveal device management pages with firmware strings.
The sophisticated cyber-espionage group known as APT28 (Fancy Bear, Sofacy) has consistently demonstrated advanced reconnaissance tradecraft. In campaigns targeting government and critical infrastructure, they have been observed conducting extensive firmware reconnaissance.
Prior to deploying their infamous LoJax UEFI rootkit, APT28 operatives would first profile target systems to confirm the presence of specific, vulnerable UEFI/BIOS firmware from vendors like AMI or Insyde. This allowed them to weaponize their rootkit only for confirmed, exploitable firmware versions, maximizing stealth and success rates.
This intelligence was gathered through a combination of initial access via phishing, followed by host enumeration, and cross-referencing with data from earlier passive firmware reconnaissance phases.
External Report: For an in-depth analysis of APT28's UEFI malware tactics, read the joint advisory from the US DHS and FBI on LoJax.
As a defender, your philosophy is "Reduce the Attack Surface and Monitor for Scouting Activity." You are the fortress commander. Your goal isn't to prevent the enemy from looking at your walls (that's nearly impossible), but to:
Detection focuses on spotting the behaviors of someone gathering this information, both from outside your network and from within after an initial foothold.
Direct detection of passive external reconnaissance (someone querying Shodan) is impossible. Your alerts will come from two places:
The Noise: Legitimate IT asset management and vulnerability scanning tools (like Lansweeper, Nessus) will also collect firmware data. You must baseline and whitelist these trusted sources to avoid alert fatigue.
Here is a Sigma rule designed to detect suspicious command-line activity indicative of an attacker trying to enumerate system firmware information on a Windows host. It looks for execution of native Windows tools (like wmic and powershell) with arguments targeting BIOS/UEFI data.
# Sigma Rule: Suspicious System Firmware Enumeration # Author: MITRE ATT&CK Field Guide # Reference: T1592.003 # Logsource: Category process_creation, Product windows title: Suspicious Firmware Information Discovery id: a1b2c3d4-5678-90ef-ghij-klmnopqrstuv status: experimental description: Detects attempts to enumerate BIOS/UEFI firmware information via command line, which may indicate reconnaissance for firmware exploitation. references: - https://attack.mitre.org/techniques/T1592/003/ author: Blue Team date: 2023/10/26 tags: - attack.reconnaissance - attack.t1592.003 logsource: category: process_creation product: windows detection: selection: CommandLine|contains|all: - 'bios' - 'get' Image|endswith: - '\wmic.exe' - '\powershell.exe' filter: CommandLine|contains: - 'trustedinstaller' # Filter out some legitimate admin/system processes - 'svchost.exe' condition: selection and not filter falsepositives: - Legitimate system administration and inventory scripts level: medium
Convert MITRE's high-level guidance into concrete actions your IT and security teams can execute.
| Attacker's Goal (Red Team) | Defender's Action (Blue Team) |
|---|---|
| Find any device running outdated, vulnerable firmware. | Maintain a complete, updated HBOM and enforce a patching SLA. |
| Identify the exact firmware version to select a weaponized exploit. | Remove firmware version details from public banners and error pages (information disclosure). |
| Use firmware vulnerabilities for persistent, deep-system rootkit installation. | Enable Secure Boot and hardware-based memory encryption (e.g., Intel TPM, AMD PSP) to make firmware exploitation harder. |
| Move laterally from a compromised firmware device to critical assets. | Implement strict network segmentation around all hardware devices. |
Unusual internal host scanning device management ports (623/IPMI, 161/SNMP) or spike in external scans targeting your specific hardware vendor's web ports.
Proactively run your own Shodan/Censys scan on your public IPs. If you can find it, so can the attacker. Then, remove or protect those services.
EDR logs for wmic bios get smbiosbiosversion or powershell Get-WmiObject Win32_BIOS commands originating from non-admin/IT workstations.
Firmware reconnaissance (T1592.003) is a critical, often overlooked precursor to some of the most devastating attacks. By understanding the attacker's methodology, passive searching, active probing, and CVE matching, you can shift from a reactive to a proactive defense posture.
Your immediate next steps should be:
Remember, defense is a cycle. Continue your learning by exploring related techniques in the Reconnaissance tactic, such as T1592.001 - Hardware and T1592.002 - Software.
For authoritative guidance on building a resilient infrastructure, consult the CISA Secure Our World campaign and the NIST SP 800-53 security controls, which provide frameworks for comprehensive asset and configuration management.
Stay vigilant, stay updated, and master the fundamentals to build an unshakable defense.
Every contribution moves us closer to our goal: making world-class cybersecurity education accessible to ALL.
Choose the amount of donation by yourself.