MITRE ATT&CK / T1550
T1550
Use Alternate Authentication Material
Description
Adversaries may use alternate authentication material, such as password hashes, Kerberos tickets, and application access tokens, in order to move laterally within an environment and bypass normal system access controls.Authentication processes generally require a valid identity (e.g., username) along with one or more authentication factors (e.g., password, pin, physical smart card, token generator, etc.). Alternate authentication material is legitimately generated by systems after a user or application successfully authenticates by providing a valid identity and the required authentication factor(s). Alternate authentication material may also be generated during the identity creation process.(Citation: NIST Authentication)(Citation: NIST MFA)Caching alternate authentication material allows the system to verify an identity has successfully authenticated without asking the user to reenter authentication factor(s). Because the alternate authentication must be maintained by the system—either in memory or on disk—it may be at risk of being stolen through [Credential Access](https://attack.mitre.org/tactics/TA0006) techniques. By stealing alternate authentication material, adversaries are able to bypass system access controls and authenticate to systems without knowing the plaintext password or any additional authentication factors.
Platforms
Mitigations
- M1047 — Audit
- M1027 — Password Policies
- M1036 — Account Use Policies
- M1026 — Privileged Account Management
- M1015 — Active Directory Configuration
- M1013 — Application Developer Guidance
- M1018 — User Account Management
Use our free MITRE ATT&CK lookup tool, or browse the full ATT&CK matrix.
Our coverage
- ConsentFix v3 Bypasses Azure MFA via Automated OAuth Abuse
- Bluekit Phishing Kit Bundles AI Assistant and 40 Templates for Scalable Campaigns
Source: MITRE ATT&CK Enterprise matrix. View on attack.mitre.org →