Credential Pinning
| ID: | TEQ-024 | 
| Phase(s): | Defence Bypass | 
| Tactic(s): | Mitigation Bypass | 
The adversary abuses credential stores, for example by hard-coding valid credentials into an application.
| ID: | TEQ-024 | 
| Phase(s): | Defence Bypass | 
| Tactic(s): | Mitigation Bypass | 
The adversary abuses credential stores, for example by hard-coding valid credentials into an application.