Windows Credential Manager (T1555.004)

View on ATT&CK

In Playbook

Associated Tactics

  • Credential Access

Credential Access (TA0006)

The adversary is trying to steal account names and passwords. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.

View on ATT&CK

Procedure Examples

Description Source(s)
Arntz, P. (2016, March 30). The Windows Vault . Retrieved November 23, 2020. Malwarebytes The Windows Vault
Delpy, B. (2017, December 12). howto ~ credential manager saved credentials. Retrieved November 23, 2020. Delpy Mimikatz Crendential Manager
Microsoft. (2013, October 23). Credential Locker Overview. Retrieved November 24, 2020. Microsoft Credential Locker
Microsoft. (2016, August 31). Cached and Stored Credentials Technical Overview. Retrieved November 24, 2020. Microsoft Credential Manager store
Microsoft. (2018, December 5). CredEnumarateA function (wincred.h). Retrieved November 24, 2020. Microsoft CredEnumerate
Passcape. (n.d.). Windows Password Recovery - Vault Explorer and Decoder. Retrieved November 24, 2020. passcape Windows Vault