Browser Session Hijacking
Adversaries may take advantage of security vulnerabilities and inherent functionality in browser software to change content, modify user-behaviors, and intercept information as part of various browser session hijacking techniques.(Citation: Wikipedia Man in the Browser) A specific example is when an adversary injects software into a browser that allows them to inherit cookies, HTTP sessions, and SSL client certificates of a user then use the browser as a way to pivot into an authenticated intra...
BY SOURCE
PROCEDURES (9)
Auto-extracted: 2 detections for cloud
Auto-extracted: 2 detections for remote
Auto-extracted: 2 detections for suspicious
Auto-extracted: 2 detections for registry
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for unusual