Skip to content

Credential Access

Credential access consists of techniques for stealing credentials like account names and passwords. Using legitimate credentials can give adversaries access to other resources, make them harder to detect, and provide the opportunity to help achieve their goals.

ID Name
MS-T818 Access key query
MS-T834 Cloud shell profiles
MS-T819 Unsecured communication channel