insidejob
AML.T0106 Demonstrated ATT&CK T1211 ↗

Exploitation for Credential Access

This technique has been demonstrated in research or controlled environments.

Adversaries may exploit software vulnerabilities in an attempt to collect credentials. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code.