Steal Application Access Token
Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources.
Description
Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resources.
Available Mitigations
This technique can be mitigated using 1 documented security measures.
Restrict Web-Based Content
Quick Info
- Technique ID
- T1528
- Tactic
- Cred Access
- Mitigations
- 1
