Esc
Use Alternate Authentication Material - T1550
(ATT&CK® Technique)
Definition
Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.