- Credential Theft and How to Secure Credentials
Prevent access to in-memory credentials
Prevent credentials from remaining
Leverage protected users and control privileged users
https://technet.microsoft.com/en-us/security/dn920237.aspx
- Unofficial Guide to
Mimikatz & Command Reference
https://adsecurity.org/?page_id=1821
- Credential stuffing
Anatomy of Attack
The attacker
The attacker uses an account checker to test the stolen credentials against many websites (for instance, social media sites or online marketplaces).
Successful logins (usually 0.1-0.2% of the total login attempts) allow the attacker to take over the account matching the stolen credentials.
The attacker drains stolen accounts of stored value, credit card numbers, and other personally identifiable information
The attacker may also use account information going forward for other nefarious purposes (for example, to send spam or create further transactions)
https://www.owasp.org/index.php/Credential_stuffing
No comments:
Post a Comment