Private Keys (T1552.004)

View on ATT&CK

In Playbook

Associated Tactics

  • Credential Access

Credential Access (TA0006)

The adversary is trying to steal account names and passwords. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.

View on ATT&CK

Procedure Examples

Description Source(s)
Bar, T., Conant, S., Efraim, L. (2016, June 28). Prince of Persia – Game Over. Retrieved July 5, 2017. Palo Alto Prince of Persia
Cisco. (2023, February 17). Chapter: Deploying RSA Keys Within a PKI . Retrieved March 27, 2023. cisco_deploy_rsa_keys
Dr. Nestori Syynimaa. (2022, February 15). Stealing and faking Azure AD device identities. Retrieved February 21, 2023. AADInternals Azure AD Device Identities
Kaspersky Labs. (2014, February 11). Unveiling “Careto” - The Masked APT. Retrieved July 5, 2017. Kaspersky Careto
Microsoft. (2022, September 9). What is a Primary Refresh Token?. Retrieved February 21, 2023. Microsoft Primary Refresh Token
Wikipedia. (2017, June 29). Public-key cryptography. Retrieved July 5, 2017. Wikipedia Public Key Crypto