Adversaries may use stolen application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems.
Sub-technique of
T1550
See: MITRE ATT&CK
Adversaries may use stolen application access tokens to bypass the typical authentication process and access restricted accounts, information, or services on remote systems.
Sub-technique of
T1550
See: MITRE ATT&CK