Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
5 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Brute Force | Credential Access | Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or … | Edit | |
| Brute Force: Credential Stuffing | Credential Access | Adversaries may use credentials obtained from breach dumps of unrelated accounts to gain access to t… | Edit | |
| Brute Force: Password Cracking | Credential Access | Adversaries may use password cracking to attempt to recover usable credentials, such as plaintext pa… | Edit | |
| Brute Force: Password Guessing | Credential Access | Adversaries with no prior knowledge of legitimate credentials within the system or environment may g… | Edit | |
| Brute Force: Password Spraying | Credential Access | Adversaries may use a single or small list of commonly used passwords against many different account… | Edit |