Credentials from Password Stores
Adversaries may search for common password storage locations to obtain user credentials.(Citation: F-Secure The Dukes) Passwords are stored in several places on a system, depending on the operating system or application holding the credentials. There are also specific applications and services that store passwords to make them easier for users to manage and maintain, such as password managers and cloud secrets vaults. Once credentials are obtained, they can be used to perform lateral movement an...
BY SOURCE
PROCEDURES (31)
Auto-extracted: 3 detections for credential
Auto-extracted: 2 detections for aws
Auto-extracted: 2 detections for lateral
Auto-extracted: 2 detections for kerbero
Auto-extracted: 2 detections for persist
Auto-extracted: 2 detections for process creation monitoring
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for kerbero
Auto-extracted: 1 detections for kerbero
Auto-extracted: 1 detections for token
Auto-extracted: 1 detections for script execution monitoring
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for token
Auto-extracted: 1 detections for dump
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for ransomware
Auto-extracted: 1 detections for powershell
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for powershell
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for lateral
Auto-extracted: 1 detections for dump
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for azure
Auto-extracted: 1 detections for cloud
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for unusual