An attacker gains access to application, service, or device with the privileges of an authorized or privileged user by evading or circumventing an authentication mechanism. The attacker is therefore able to access protected data without authentication ever having taken place.
Description
Consequences
Relationships
Related ATT&CK Techniques
1
Resources Required
1