Esc
Exploitation for Credential Access - T1212
(ATT&CK® Technique)
Definition
Adversaries may exploit software vulnerabilities in an attempt to collect credentials. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.