Windows Credentials from Password Stores Deletion
Credentials from Password Stores
Credentials from Password Stores
Unix Shell Configuration Modification, Event Triggered Execution
Exfiltration Over Unencrypted Non-C2 Protocol, Exfiltration Over Alternative Protocol
Modify Registry
Password Spraying, Brute Force