Critical Infrastructure Cybersecurity Framework
T1555Cred Access1 Mitigations

Credentials from Password Stores

Adversaries may search for common password storage locations to obtain user credentials.

Description

Adversaries may search for common password storage locations to obtain user credentials.

Available Mitigations

This technique can be mitigated using 1 documented security measures.

Password Policies

Quick Info

Technique ID
T1555
Sub-Techniques
6
Mitigations
1

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.