πŸ““
πŸ““
πŸ““
πŸ““
Red Team Notes 2.0
Search…
πŸ““
πŸ““
πŸ““
πŸ““
Red Team Notes 2.0
Introduction
Red Team
Red Team Techniques
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential Access
T1552: Unsecured Credentials
T1558: Steal or Forge Kerberos Tickets
T1003: OS Credential Dumping
T1040: Network Sniffing
T1556: Modify Authentication Process
T1557: Man-in-the-Middle
T1056: Input Capture
T1187: Forced Authentication
T1555: Credentials from Password Stores
Credentials from Web Browsers
T1110: Brute Force
Discovery
Lateral Movement
Active Directory
Active Directory
Active Directory Attacks
Red Team Infrastructure
RED TEAM INFRASTRUCTURE
Domain Name and Categorization
Reconnaissance
Weaponization
Delivery
Situational Awareness
Credential Dumping
Persistence
Defense Evasion
Privilege Escalation
Lateral Movement
Powered By GitBook
T1555: Credentials from Password Stores
Adversaries may search for common password storage locations to obtain user credentials. Passwords are stored in several places on a system, depending on the operating system or application holding the credentials. There are also specific applications that store passwords to make it easier for users manage and maintain. Once credentials are obtained, they can be used to perform lateral movement and access restricted information.
Previous
T1187: Forced Authentication
Next
Credentials from Web Browsers
Last modified 1yr ago
Copy link