Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
5 threats — page 1 of 1
Name Category Tags Description
Use Alternate Authentication Material Defense Evasion Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, an… Edit
Use Alternate Authentication Material: Application Access Token Defense Evasion Adversaries may use stolen application access tokens to bypass the typical authentication process an… Edit
Use Alternate Authentication Material: Pass the Hash Defense Evasion Adversaries may “pass the hash” using stolen password hashes to move laterally within an environment… Edit
Use Alternate Authentication Material: Pass the Ticket Defense Evasion Adversaries may “pass the ticket” using stolen Kerberos tickets to move laterally within an environm… Edit
Use Alternate Authentication Material: Web Session Cookie Defense Evasion Adversaries can use stolen session cookies to authenticate to web applications and services. This te… Edit