Exploitation for Credential Access
Tactic: Credential Access
This technique has been demonstrated in research or controlled environments.
Adversaries may exploit software vulnerabilities in an attempt to collect credentials. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code.