← Back to Explore
T1110.002
Password Cracking
Adversaries may use password cracking to attempt to recover usable credentials, such as plaintext passwords, when credential material such as password hashes are obtained. [OS Credential Dumping](https://attack.mitre.org/techniques/T1003) can be used to obtain password hashes, this may only get an adversary so far when [Pass the Hash](https://attack.mitre.org/techniques/T1550/002) is not an option. Further, adversaries may leverage [Data from Configuration Repository](https://attack.mitre.org/t...
LinuxmacOSWindowsNetwork DevicesOffice SuiteIdentity Provider
2
Detections
2
Sources
4
Threat Actors
BY SOURCE
1elastic1sigma
PROCEDURES (2)
Process Creation Monitoring1 detections
Auto-extracted: 1 detections for process creation monitoring
Network Connection Monitoring1 detections
Auto-extracted: 1 detections for network connection monitoring