- Tactics
- defense-impairment , Persistence , Credential Access
- Platforms
- IaaS, Identity Provider, Linux, macOS, Network Devices, Office Suite, SaaS, Windows
- Reference
- attack.mitre.org/techniques/T1556
Description
Adversaries may modify authentication mechanisms and processes to access user credentials or enable otherwise unwarranted access to accounts. The authentication process is handled by mechanisms, such as the Local Security Authentication Server (LSASS) process and the Security Accounts Manager (SAM) on Windows, pluggable authentication modules (PAM) on Unix-based systems, and authorization plugins on MacOS systems, responsible for gathering, storing, and validating credentials. By modifying an authentication process, an adversary may be able to authenticate to a service or system without using Valid Accounts.
Adversaries may maliciously modify a part of this process to either reveal credentials or bypass authentication mechanisms. Compromised credentials or access may be used to bypass access controls placed on various resources on systems within the network and may even be used for persistent access to remote systems and externally available services, such as VPNs, Outlook Web Access and remote desktop.
Sub-techniques
- T1556.001 — Domain Controller Authentication
- T1556.002 — Password Filter DLL
- T1556.003 — Pluggable Authentication Modules
- T1556.004 — Network Device Authentication
- T1556.005 — Reversible Encryption
- T1556.006 — Multi-Factor Authentication
- T1556.007 — Hybrid Identity
- T1556.008 — Network Provider DLL
- T1556.009 — Conditional Access Policies
How GTK Cyber trains on this
GTK Cyber's hands-on training programs cover detection engineering across the MITRE ATT&CK framework, including the defense-impairment, Persistence, Credential Access tactic this technique falls under. Our practitioner-led courses focus on building real detections, not just memorizing technique IDs.
Related techniques
- T1003 — OS Credential Dumping
- T1037 — Boot or Logon Initialization Scripts
- T1040 — Network Sniffing
- T1053 — Scheduled Task/Job
- T1056 — Input Capture
- T1078 — Valid Accounts
- T1098 — Account Manipulation
- T1110 — Brute Force
- T1111 — Multi-Factor Authentication Interception
- T1112 — Modify Registry
- T1133 — External Remote Services
- T1136 — Create Account