TA0006 Credential Access

The adversary is trying to steal account names and passwords. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.

View in MITRE ATT&CK®

ATT&CK Techniques

Technique ID Technique Name Number of Mappings Number of Subtechniques
T1557 Adversary-in-the-Middle 57 4
T1003 OS Credential Dumping 44 8
T1539 Steal Web Session Cookie 28 0
T1040 Network Sniffing 43 0
T1558 Steal or Forge Kerberos Tickets 38 5
T1555 Credentials from Password Stores 28 6
T1552 Unsecured Credentials 72 8
T1649 Steal or Forge Authentication Certificates 12 0
T1528 Steal Application Access Token 41 0
T1606 Forge Web Credentials 27 2
T1621 Multi-Factor Authentication Request Generation 19 0
T1212 Exploitation for Credential Access 55 0
T1110 Brute Force 72 4
T1187 Forced Authentication 24 0
T1056 Input Capture 6 4
T1111 Multi-Factor Authentication Interception 12 0
T1556 Modify Authentication Process 50 9