Unsecured Credentials
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Description
Adversaries may search compromised systems to find and obtain insecurely stored credentials.
Available Mitigations
This technique can be mitigated using 3 documented security measures.
AuditEncrypt Sensitive InformationPassword Policies
Quick Info
- Technique ID
- T1552
- Tactic
- Cred Access
- Sub-Techniques
- 8
- Mitigations
- 3
