Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
7 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Credentials from Password Stores | Credential Access | Adversaries may search for common password storage locations to obtain user credentials. Passwords a… | Edit | |
| Credentials from Password Stores: Cloud Secrets Management Stores | Credential Access | Adversaries may acquire credentials from cloud-native secret management solutions such as AWS Secret… | Edit | |
| Credentials from Password Stores: Credentials from Web Browsers | Credential Access | Adversaries may acquire credentials from web browsers by reading files specific to the target browse… | Edit | |
| Credentials from Password Stores: Keychain | Credential Access | Adversaries may acquire credentials from Keychain. Keychain (or Keychain Services) is the macOS cred… | Edit | |
| Credentials from Password Stores: Password Managers | Credential Access | Adversaries may acquire user credentials from third-party password managers. Password managers are a… | Edit | |
| Credentials from Password Stores: Securityd Memory | Credential Access | An adversary with root access may gather credentials by reading securityd’s memory. securityd is a s… | Edit | |
| Credentials from Password Stores: Windows Credential Manager | Credential Access | Adversaries may acquire credentials from the Windows Credential Manager. The Credential Manager stor… | Edit |