Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
9 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Unsecured Credentials | Credential Access | Adversaries may search compromised systems to find and obtain insecurely stored credentials. These c… | Edit | |
| Unsecured Credentials: Chat Messages | Credential Access | Adversaries may directly collect unsecured credentials stored or passed through user communication s… | Edit | |
| Unsecured Credentials: Cloud Instance Metadata API | Credential Access | Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other s… | Edit | |
| Unsecured Credentials: Container API | Credential Access | Adversaries may gather credentials via APIs within a containers environment. APIs in these environme… | Edit | |
| Unsecured Credentials: Credentials In Files | Credential Access | Adversaries may search local file systems and remote file shares for files containing insecurely sto… | Edit | |
| Unsecured Credentials: Credentials in Registry | Credential Access | Adversaries may search the Registry on compromised systems for insecurely stored credentials. The Wi… | Edit | |
| Unsecured Credentials: Group Policy Preferences | Credential Access | Adversaries may attempt to find unsecured credentials in Group Policy Preferences (GPP). GPP are too… | Edit | |
| Unsecured Credentials: Private Keys | Credential Access | Adversaries may search for private key certificate files on compromised systems for insecurely store… | Edit | |
| Unsecured Credentials: Shell History | Credential Access | Adversaries may search the command history on compromised systems for insecurely stored credentials.… | Edit |