Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 229

Credential Access

What is Credential Access?

Credential AccessThe MITRE ATT&CK tactic (TA0006) that covers techniques used to steal account names, passwords, tokens, and other secrets.


Credential Access (MITRE ATT&CK tactic TA0006) groups techniques that adversaries use to obtain credentials they can reuse to authenticate as legitimate users. Examples include dumping LSASS memory with tools like Mimikatz, extracting NTDS.dit from a domain controller, reading the Windows registry SAM/SECURITY hives, harvesting browser-stored passwords, kerberoasting, AS-REP roasting, capturing NTLM hashes via responder, reading cloud-provider tokens from disk, phishing for MFA codes, and abusing OAuth consent. Stolen credentials enable lateral movement, persistence, and privilege escalation, often without triggering malware-based detections. Defenders rely on credential guard, LSA protection, strong MFA, tiered admin models, password vaulting, anomalous-logon detection, and immediate revocation when compromise is suspected.

Examples

  1. 01

    Running Mimikatz to extract plaintext credentials from a Windows server's LSASS process.

  2. 02

    Performing a kerberoasting attack to crack offline the TGS for a service account.

Frequently asked questions

What is Credential Access?

The MITRE ATT&CK tactic (TA0006) that covers techniques used to steal account names, passwords, tokens, and other secrets. It belongs to the Defense & Operations category of cybersecurity.

What does Credential Access mean?

The MITRE ATT&CK tactic (TA0006) that covers techniques used to steal account names, passwords, tokens, and other secrets.

How does Credential Access work?

Credential Access (MITRE ATT&CK tactic TA0006) groups techniques that adversaries use to obtain credentials they can reuse to authenticate as legitimate users. Examples include dumping LSASS memory with tools like Mimikatz, extracting NTDS.dit from a domain controller, reading the Windows registry SAM/SECURITY hives, harvesting browser-stored passwords, kerberoasting, AS-REP roasting, capturing NTLM hashes via responder, reading cloud-provider tokens from disk, phishing for MFA codes, and abusing OAuth consent. Stolen credentials enable lateral movement, persistence, and privilege escalation, often without triggering malware-based detections. Defenders rely on credential guard, LSA protection, strong MFA, tiered admin models, password vaulting, anomalous-logon detection, and immediate revocation when compromise is suspected.

How do you defend against Credential Access?

Defences for Credential Access typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Credential Access?

Common alternative names include: Credential theft, TA0006.

Related terms

See also