T1110.002 - Password Cracking

Sub-technique
Tactics:
Credential Access
Platforms:
Linux macOS Windows Network Devices +2
Detection:
Not specified
Description:
Adversaries may use password cracking to attempt to recover usable credentials, such as plaintext passwords, when credential material such as password hashes are obtained. [OS Credential Dumping](https://attack.mitre.org/techniques/T1003) can be used to obtain password hashes, this may only get an adversary so far when [Pass the Hash](https://attack.mitre.org/techniques/T1550/002) is not an option. Further, adversaries may leverage [Data from Configuration Repository](https://attack.mitre.org/techniques/T1602) in order to obtain hashed credentials for network devices.(Citation: US-CERT-TA18-106A)

Techniques to systematically guess the passwords used to compute hashes are available, or the adversary may use a pre-computed rainbow table to crack hashes. Cracking hashes is usually done on adversary-controlled systems outside of the target network.(Citation: Wikipedia Password cracking) The resulting plaintext password resulting from a successfully cracked hash may be used to log into systems, resources, and services in which the account has access.
Metadata
MITRE ID: T1110.002
STIX ID: attack-pattern--1d24cdee-9ea2-...
Platforms: Linux, macOS, Windows, Network Devices, Office Suite, Identity Provider
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00