Critical Infrastructure Cybersecurity Framework
T1212Cred Access2 Mitigations

Exploitation for Credential Access

Adversaries may exploit software vulnerabilities in an attempt to collect credentials.

Description

Adversaries may exploit software vulnerabilities in an attempt to collect credentials.

Available Mitigations

This technique can be mitigated using 2 documented security measures.

Exploit ProtectionUpdate Software

Quick Info

Technique ID
T1212
Mitigations
2

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.