Pluggable Authentication Modules (T1556.003)

View on ATT&CK

In Playbook

Associated Tactics

  • Credential Access
  • Defense Evasion
  • Persistence

Credential Access (TA0006)

The adversary is trying to steal account names and passwords. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.

View on ATT&CK

Procedure Examples

Description Source(s)
Apple. (2011, May 11). PAM - Pluggable Authentication Modules. Retrieved June 25, 2020. Apple PAM
die.net. (n.d.). pam_unix(8) - Linux man page. Retrieved June 25, 2020. Man Pam_Unix
Fernández, J. M. (2018, June 27). Exfiltrating credentials via PAM backdoors & DNS requests. Retrieved June 26, 2020. PAM Creds
Red Hat. (n.d.). CHAPTER 2. USING PLUGGABLE AUTHENTICATION MODULES (PAM). Retrieved June 25, 2020. Red Hat PAM
zephrax. (2018, August 3). linux-pam-backdoor. Retrieved June 25, 2020. PAM Backdoor