Exploitation for Credential Access
Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
Description
Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
Available Mitigations
This technique can be mitigated using 2 documented security measures.
Exploit ProtectionUpdate Software
Quick Info
- Technique ID
- T1212
- Tactic
- Cred Access
- Mitigations
- 2
