Unsecured Credentials
Sub-techniques (4)
Adversaries may search compromised systems to find and obtain insecurely stored credentials. These credentials can be stored and/or misplaced in many locations on a system, including plaintext files (e.g. Bash History [MITRE] ), operating system or application-specific repositories (e.g. Credentials in Registry [MITRE] ), or other specialized files/artifacts (e.g. Private Keys [MITRE] ).