Threats Library

Reusable threat definitions (causes on the left side of bow-tie diagrams).

Add Threat

Tags: clear tags
Clear all
10 threats — page 1 of 1
Name Category Tags Description
Modify Authentication Process Credential Access Adversaries may modify authentication mechanisms and processes to access user credentials or enable … Edit
Modify Authentication Process: Conditional Access Policies Credential Access Adversaries may disable or modify conditional access policies to enable persistent access to comprom… Edit
Modify Authentication Process: Domain Controller Authentication Credential Access Adversaries may patch the authentication process on a domain controller to bypass the typical authen… Edit
Modify Authentication Process: Hybrid Identity Credential Access Adversaries may patch, modify, or otherwise backdoor cloud authentication processes that are tied to… Edit
Modify Authentication Process: Multi-Factor Authentication Credential Access Adversaries may disable or modify multi-factor authentication (MFA) mechanisms to enable persistent … Edit
Modify Authentication Process: Network Device Authentication Credential Access Adversaries may use Patch System Image to hard code a password in the operating system, thus bypassi… Edit
Modify Authentication Process: Network Provider DLL Credential Access Adversaries may register malicious network provider dynamic link libraries (DLLs) to capture clearte… Edit
Modify Authentication Process: Password Filter DLL Credential Access Adversaries may register malicious password filter dynamic link libraries (DLLs) into the authentica… Edit
Modify Authentication Process: Pluggable Authentication Modules Credential Access Adversaries may modify pluggable authentication modules (PAM) to access user credentials or enable o… Edit
Modify Authentication Process: Reversible Encryption Credential Access An adversary may abuse Active Directory authentication encryption properties to gain access to crede… Edit