Proc Filesystem (T1003.007)

View on ATT&CK

In Playbook

Associated Tactics

  • Credential Access

Credential Access (TA0006)

The adversary is trying to steal account names and passwords. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.

View on ATT&CK

Procedure Examples

Description Source(s)
Atomic Red Team. (2023, November). T1003.007 - OS Credential Dumping: Proc Filesystem. Retrieved March 28, 2024. atomic-red proc file system
baeldung. (2022, April 8). Understanding the Linux /proc/id/maps File. Retrieved March 31, 2023. baeldung Linux proc map 2022
Carlos Polop. (2023, March 5). Linux Privilege Escalation. Retrieved March 31, 2023. Polop Linux PrivEsc Gitbook
Gregal, H. (2017, May 12). MimiPenguin. Retrieved December 5, 2017. MimiPenguin GitHub May 2017
Huseyin Can YUCEEL & Picus Labs. (2022, March 22). Retrieved March 31, 2023. Picus Labs Proc cump 2022