List of all Techniques under Credential Access Tactics in MITRE Enterprise ATT&CK Framework

Initial Credential Access Tactics in MITRE Enterprise ATT&CK Framework has total of 23 Techniques. Below is listing of all Techniques under Initial Credential Access Tactics in MITRE Enterprise ATT&CK Framework:

  1. Account Manipulation
  2. Bash History
  3. Brute Force
  4. Cloud Instance Metadata API
  5. Credential Dumping
  6. Credentials from Web Browsers
  7. Credentials in Files
  8. Credentials in Registry
  9. Exploitation for Credential Access
  10. Forced Authentication
  11. Hooking
  12. Input Capture
  13. Input Prompt
  14. Kerberoasting
  15. Keychain
  16. LLMNR/NBT-NS Poisoning and Relay
  17. Network Sniffing
  18. Password Filter DLL
  19. Private Keys
  20. Securityd Memory
  21. Steal Application Access Token
  22. Steal Web Session Cookie
  23. Two-Factor Authentication Interception

For list of all other Tactics and Techniques in MITRE Enterprise ATT&CK Framework, please go to List of all Tactics in MITRE Enterprise ATT&CK Framework