Adversaries can use stolen session cookies to authenticate to web applications and services.
Sub-technique of
T1550
See: MITRE ATT&CK
Adversaries can use stolen session cookies to authenticate to web applications and services.
Sub-technique of
T1550
See: MITRE ATT&CK