Technique: OS Credential Dumping

ID: T1003

Export to Word

Description

Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password. Credentials can be obtained from OS caches, memory, or structures.(Citation: Brining MimiKatz to Unix) Credentials can then be used to perform [Lateral Movement](https://attack.mitre.org/tactics/TA0008) and access restricted information. Several of the tools mentioned in associated sub-techniques may be used by both adversaries and professional security testers. Additional custom tools likely exist as well.

Threat-Mapped Scoring

Threat Score: 3.0
Industry:
Threat Priority: P2 - Serious (High)

ATT&CK Kill Chain Metadata

Malware

APTs (Intrusion Sets)

← Back to Home ← Back to TTP Search