Exploitation for Credential Access (Windows)

Description

Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel. 

Products, Sensors, and Dependencies

ProductDependenciesData sourceAccess requiredProtocolData CollectedNotes
Tenable Vulnerability ManagementAdvanced Network ScanWindows machinesUnauthenticated or Authenticated ScanAnyVulnerabilities

Attack Path Technique Details

Framework: MITRE ATT&CK

Family: Credential Access

Platform: Windows

Tenable Release Date: 2022 Q3