Network Provider DLL (T1556.008)

View on ATT&CK

In Playbook

Associated Tactics

  • Credential Access
  • Defense Evasion
  • Persistence

Credential Access (TA0006)

The adversary is trying to steal account names and passwords. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.

View on ATT&CK

Procedure Examples

Description Source(s)
Dray Agha. (2022, August 16). Cleartext Shenanigans: Gifting User Passwords to Adversaries With NPPSPY. Retrieved March 30, 2023. NPPSPY - Huntress
Grzegorz Tworek. (2021, December 14). How winlogon.exe shares the cleartext password with custom DLLs. Retrieved March 30, 2023. NPPSPY Video
Grzegorz Tworek. (2021, December 15). NPPSpy. Retrieved March 30, 2023. NPPSPY
Microsoft. (2021, January 7). Network Provider API. Retrieved March 30, 2023. Network Provider API
Microsoft. (2021, October 21). NPLogonNotify function (npapi.h). Retrieved March 30, 2023. NPLogonNotify