Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
5 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Use Alternate Authentication Material | Defense Evasion | Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, an… | Edit | |
| Use Alternate Authentication Material: Application Access Token | Defense Evasion | Adversaries may use stolen application access tokens to bypass the typical authentication process an… | Edit | |
| Use Alternate Authentication Material: Pass the Hash | Defense Evasion | Adversaries may “pass the hash” using stolen password hashes to move laterally within an environment… | Edit | |
| Use Alternate Authentication Material: Pass the Ticket | Defense Evasion | Adversaries may “pass the ticket” using stolen Kerberos tickets to move laterally within an environm… | Edit | |
| Use Alternate Authentication Material: Web Session Cookie | Defense Evasion | Adversaries can use stolen session cookies to authenticate to web applications and services. This te… | Edit |