Critical Infrastructure Cybersecurity Framework
T1550Defense Evasion1 Mitigations

Use Alternate Authentication Material

Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens.

Description

Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

User Account Management

Quick Info

Technique ID
T1550
Sub-Techniques
4
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.