Skip to main content
MuonPartners
Services
Architecture

Solution design and technology roadmapping

Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security

Security assessments, IAM, and compliance

AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform

Network architecture and cloud platforms

Network DesignCloud StrategyModernisation
Enterprise Architecture

Business-technology alignment

Business AlignmentPortfolio AnalysisGovernance
View all services
ProjectsCase StudiesInsightsToolsAbout
Contact Us

Services

Architecture
Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security
AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform
Network DesignCloud StrategyModernisation
Enterprise Architecture
Business AlignmentPortfolio AnalysisGovernance
ProjectsCase StudiesInsightsToolsAboutContact
Get in Touch
MuonPartners

Strategic technology consulting for Australian organisations navigating complexity.

Services

  • Architecture
  • Cyber Security
  • Network and Platform
  • Enterprise Architecture

Company

  • About
  • Products
  • Frameworks
  • Cross-Framework Mapping
  • Projects
  • Case Studies
  • Insights
  • Contact

Contact

  • [email protected]
  • Australia
  • LinkedIn

© 2026 Muon Partners. All rights reserved.

ABN 50 669 022 315 · A Muon Group company.

Privacy PolicyTerms of Service
  1. Frameworks
  2. >ATTACK
  3. >Collection
  4. >ATTACK-T1056.004
ATTACK-T1056.004Active

Credential API Hooking

Statement

Adversaries may hook into Windows application programming interface (API) functions and Linux system functions to collect user credentials. Malicious hooking mechanisms may capture API or function calls that include parameters that reveal user authentication credentials.(Citation: Microsoft TrojanSpy:Win32/Ursnif.gen!I Sept 2017) Unlike Keylogging, this technique focuses specifically on API functions that include parameters that reveal user credentials.

In Windows, hooking involves redirecting calls to these functions and can be implemented via:

  • Hooks procedures, which intercept and execute designated code in response to events such as messages, keystrokes, and mouse inputs.(Citation: Microsoft Hook Overview)(Citation: Elastic Process Injection July 2017)
  • Import address table (IAT) hooking, which use modifications to a process’s IAT, where pointers to imported API functions are stored.(Citation: Elastic Process Injection July 2017)(Citation: Adlice Software IAT Hooks Oct 2014)(Citation: MWRInfoSecurity Dynamic Hooking 2015)
  • Inline hooking, which overwrites the first bytes in an API function to redirect code flow.(Citation: Elastic Process Injection July 2017)(Citation: HighTech Bridge Inline Hooking Sept 2011)(Citation: MWRInfoSecurity Dynamic Hooking 2015)

In Linux and macOS, adversaries may hook into system functions via the LD_PRELOAD (Linux) or DYLD_INSERT_LIBRARIES (macOS) environment variables, which enables loading shared libraries into a program’s address space. For example, an adversary may capture credentials by hooking into the libc read function leveraged by SSH or SCP.(Citation: Intezer Symbiote 2022)

Location

Tactic
Collection

Technique Details

Identifier
ATTACK-T1056.004
Parent Technique
ATTACK-T1056
ATT&CK Page
View on MITRE

Tactics

CollectionCredential Access

Platforms

WindowsLinuxmacOS

Detection

Detection of Credential Harvesting via API Hooking

No cross-framework mappings available

← Back to Collection
Collection36 controls
ATTACK-T1005Data from Local SystemATTACK-T1025Data from Removable MediaATTACK-T1039Data from Network Shared DriveATTACK-T1056Input CaptureATTACK-T1056.001KeyloggingATTACK-T1056.002GUI Input CaptureATTACK-T1056.003Web Portal CaptureATTACK-T1056.004Credential API HookingATTACK-T1074Data StagedATTACK-T1074.001Local Data StagingATTACK-T1074.002Remote Data StagingATTACK-T1113Screen CaptureATTACK-T1114Email CollectionATTACK-T1114.001Local Email CollectionATTACK-T1114.002Remote Email CollectionATTACK-T1114.003Email Forwarding RuleATTACK-T1115Clipboard DataATTACK-T1119Automated CollectionATTACK-T1123Audio CaptureATTACK-T1125Video CaptureATTACK-T1185Browser Session HijackingATTACK-T1213Data from Information RepositoriesATTACK-T1213.001ConfluenceATTACK-T1213.002SharepointATTACK-T1213.003Code RepositoriesATTACK-T1213.004Customer Relationship Management SoftwareATTACK-T1213.005Messaging ApplicationsATTACK-T1213.006DatabasesATTACK-T1530Data from Cloud StorageATTACK-T1560Archive Collected DataATTACK-T1560.001Archive via UtilityATTACK-T1560.002Archive via LibraryATTACK-T1560.003Archive via Custom MethodATTACK-T1602Data from Configuration RepositoryATTACK-T1602.001SNMP (MIB Dump)ATTACK-T1602.002Network Device Configuration Dump