Trusted Design

TA0006 - Credential Access

戦術「Credential Access」に関連する攻撃手法(Technique)の一覧です。

Technique ID Name Description
T1003 OS Credential Dumping Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a h…
T1003.001 LSASS Memory Adversaries may attempt to access credential material stored in the process memory of the Local Security Authority Subsy…
T1003.002 Security Account Manager Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database either through i…
T1003.003 NTDS Adversaries may attempt to access or create a copy of the Active Directory domain database in order to steal credential …
T1003.004 LSA Secrets Adversaries with SYSTEM access to a host may attempt to access Local Security Authority (LSA) secrets, which can contain…
T1003.005 Cached Domain Credentials Adversaries may attempt to access cached domain credentials used to allow authentication to occur in the event a domain …
T1003.006 DCSync Adversaries may attempt to access credentials and other sensitive information by abusing a Windows Domain Controller's a…
T1003.007 Proc Filesystem Adversaries may gather credentials from the proc filesystem or `/proc`. The proc filesystem is a pseudo-filesystem used …
T1003.008 /etc/passwd and /etc/shadow Adversaries may attempt to dump the contents of <code>/etc/passwd</code> and <code>/etc/shadow</code> to enable offline …
T1040 Network Sniffing Adversaries may passively sniff network traffic to capture information about an environment, including authentication ma…
T1081 Credentials in Files Adversaries may search local file systems and remote file shares for files containing passwords. These can be files crea…
T1110 Brute Force Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes…
T1110.001 Password Guessing Adversaries with no prior knowledge of legitimate credentials within the system or environment may guess passwords to at…
T1110.002 Password Cracking Adversaries may use password cracking to attempt to recover usable credentials, such as plaintext passwords, when creden…
T1110.003 Password Spraying Adversaries may use a single or small list of commonly used passwords against many different accounts to attempt to acqu…
T1110.004 Credential Stuffing Adversaries may use credentials obtained from breach dumps of unrelated accounts to gain access to target accounts throu…
T1111 Multi-Factor Authentication Interception Adversaries may target multi-factor authentication (MFA) mechanisms, (i.e., smart cards, token generators, etc.) to gain…
T1139 Bash History Bash keeps track of the commands users type on the command-line with the "history" utility. Once a user logs out, the hi…
T1141 Input Prompt When programs are executed that need additional privileges than are present in the current user context, it is common fo…
T1142 Keychain Keychains are the built-in way for macOS to keep track of users' passwords and credentials for many services and feature…
T1145 Private Keys Private cryptographic keys and certificates are used for authentication, encryption/decryption, and digital signatures. …
T1167 Securityd Memory In OS X prior to El Capitan, users with root access can read plaintext keychain passwords of logged-in users because App…
T1171 LLMNR/NBT-NS Poisoning and Relay Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBT-NS) are Microsoft Windows components that ser…
T1174 Password Filter DLL Windows password filters are password policy enforcement mechanisms for both domain and local accounts. Filters are impl…
T1187 Forced Authentication Adversaries may gather credential material by invoking or forcing a user to automatically provide authentication informa…
T1208 Kerberoasting Service principal names (SPNs) are used to uniquely identify each instance of a Windows service. To enable authenticatio…
T1212 Exploitation for Credential Access Adversaries may exploit software vulnerabilities in an attempt to collect credentials. Exploitation of a software vulner…
T1214 Credentials in Registry The Windows Registry stores configuration information that can be used by the system or other programs. Adversaries may …
T1503 Credentials from Web Browsers Adversaries may acquire credentials from web browsers by reading files specific to the target browser. (Citation: Talos…
T1522 Cloud Instance Metadata API Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data. Most…
T1528 Steal Application Access Token Adversaries can steal application access tokens as a means of acquiring credentials to access remote systems and resourc…
T1539 Steal Web Session Cookie An adversary may steal web application or service session cookies and use them to gain access to web applications or Int…
T1552 Unsecured Credentials Adversaries may search compromised systems to find and obtain insecurely stored credentials. These credentials can be st…
T1552.001 Credentials In Files Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials. The…
T1552.002 Credentials in Registry Adversaries may search the Registry on compromised systems for insecurely stored credentials. The Windows Registry store…
T1552.003 Shell History Adversaries may search the command history on compromised systems for insecurely stored credentials. On Linux and macOS…
T1552.004 Private Keys Adversaries may search for private key certificate files on compromised systems for insecurely stored credentials. Priva…
T1552.005 Cloud Instance Metadata API Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data. Most…
T1552.006 Group Policy Preferences Adversaries may attempt to find unsecured credentials in Group Policy Preferences (GPP). GPP are tools that allow admini…
T1552.007 Container API Adversaries may gather credentials via APIs within a containers environment. APIs in these environments, such as the Doc…
T1552.008 Chat Messages Adversaries may directly collect unsecured credentials stored or passed through user communication services. Credentials…
T1555 Credentials from Password Stores Adversaries may search for common password storage locations to obtain user credentials.(Citation: F-Secure The Dukes) P…
T1555.001 Keychain Adversaries may acquire credentials from Keychain. Keychain (or Keychain Services) is the macOS credential management sy…
T1555.002 Securityd Memory An adversary with root access may gather credentials by reading `securityd`’s memory. `securityd` is a service/daemon re…
T1555.003 Credentials from Web Browsers Adversaries may acquire credentials from web browsers by reading files specific to the target browser.(Citation: Talos O…
T1555.004 Windows Credential Manager Adversaries may acquire credentials from the Windows Credential Manager. The Credential Manager stores credentials for s…
T1555.005 Password Managers Adversaries may acquire user credentials from third-party password managers.(Citation: ise Password Manager February 201…
T1555.006 Cloud Secrets Management Stores Adversaries may acquire credentials from cloud-native secret management solutions such as AWS Secrets Manager, GCP Secre…
T1557 Adversary-in-the-Middle Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (A…
T1557.001 Name Resolution Poisoning and SMB Relay By responding to LLMNR/NBT-NS/mDNS network traffic, adversaries may spoof an authoritative source for name resolution to…
T1557.002 ARP Cache Poisoning Adversaries may poison Address Resolution Protocol (ARP) caches to position themselves between the communication of two …
T1557.003 DHCP Spoofing Adversaries may redirect network traffic to adversary-owned systems by spoofing Dynamic Host Configuration Protocol (DHC…
T1557.004 Evil Twin Adversaries may host seemingly genuine Wi-Fi access points to deceive users into connecting to malicious networks as a w…
T1558 Steal or Forge Kerberos Tickets Adversaries may attempt to subvert Kerberos authentication by stealing or forging Kerberos tickets to enable [Pass the T…
T1558.001 Golden Ticket Adversaries who have the KRBTGT account password hash may forge Kerberos ticket-granting tickets (TGT), also known as a …
T1558.002 Silver Ticket Adversaries who have the password hash of a target service account (e.g. SharePoint, MSSQL) may forge Kerberos ticket gr…
T1558.003 Kerberoasting Adversaries may abuse a valid Kerberos ticket-granting ticket (TGT) or sniff network traffic to obtain a ticket-granting…
T1558.004 AS-REP Roasting Adversaries may reveal credentials of accounts that have disabled Kerberos preauthentication by [Password Cracking](http…
T1558.005 Ccache Files Adversaries may attempt to steal Kerberos tickets stored in credential cache files (or ccache). These files are used fo…
T1606 Forge Web Credentials Adversaries may forge credential materials that can be used to gain access to web applications or Internet services. Web…
T1606.001 Web Cookies Adversaries may forge web cookies that can be used to gain access to web applications or Internet services. Web applicat…
T1606.002 SAML Tokens An adversary may forge SAML tokens with any permissions claims and lifetimes if they possess a valid SAML token-signing …
T1621 Multi-Factor Authentication Request Generation Adversaries may attempt to bypass multi-factor authentication (MFA) mechanisms and gain access to accounts by generating…
T1649 Steal or Forge Authentication Certificates Adversaries may steal or forge certificates used for authentication to access remote systems or resources. Digital certi…