Record summary
A quick snapshot of what this page covers.
ATT&CK object
The broader cybersecurity technique connected to these AI records.
Adversaries may attempt to dump credentials to obtain account login and credential material, normally in the form of a hash or a clear text password. Credentials can be obtained from OS caches, memory, or structures.(Citation: Brining MimiKatz to Unix) Credentials can then be used to perform Lateral Movement and access restricted information.
Several of the tools mentioned in associated sub-techniques may be used by both adversaries and professional security testers. Additional custom tools likely exist as well.
- ATT&CK ID
- T1003
- STIX ID
- attack-pattern--0a3ead4e-6d47-4ccb-854c-a6a4f9d96b22
- Name
- OS Credential Dumping
- Connected AI records
- 1
Connected AI records
AI security records connected to this cybersecurity technique.
AML.T0090 - OS Credential Dumping
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.