Threats Library
Reusable threat definitions (causes on the left side of bow-tie diagrams).
Add Threat
Tags:
clear tags
10 threats — page 1 of 1
| Name | Category | Tags | Description | |
|---|---|---|---|---|
| Modify Authentication Process | Credential Access | Adversaries may modify authentication mechanisms and processes to access user credentials or enable … | Edit | |
| Modify Authentication Process: Conditional Access Policies | Credential Access | Adversaries may disable or modify conditional access policies to enable persistent access to comprom… | Edit | |
| Modify Authentication Process: Domain Controller Authentication | Credential Access | Adversaries may patch the authentication process on a domain controller to bypass the typical authen… | Edit | |
| Modify Authentication Process: Hybrid Identity | Credential Access | Adversaries may patch, modify, or otherwise backdoor cloud authentication processes that are tied to… | Edit | |
| Modify Authentication Process: Multi-Factor Authentication | Credential Access | Adversaries may disable or modify multi-factor authentication (MFA) mechanisms to enable persistent … | Edit | |
| Modify Authentication Process: Network Device Authentication | Credential Access | Adversaries may use Patch System Image to hard code a password in the operating system, thus bypassi… | Edit | |
| Modify Authentication Process: Network Provider DLL | Credential Access | Adversaries may register malicious network provider dynamic link libraries (DLLs) to capture clearte… | Edit | |
| Modify Authentication Process: Password Filter DLL | Credential Access | Adversaries may register malicious password filter dynamic link libraries (DLLs) into the authentica… | Edit | |
| Modify Authentication Process: Pluggable Authentication Modules | Credential Access | Adversaries may modify pluggable authentication modules (PAM) to access user credentials or enable o… | Edit | |
| Modify Authentication Process: Reversible Encryption | Credential Access | An adversary may abuse Active Directory authentication encryption properties to gain access to crede… | Edit |