Valid Accounts: Local Accounts
This hands-on lab is designed to provide learners with an understanding of local accounts and their exploitation to further the objectives of an adversary in a cyber operation.

Course Content
By leveraging T1078.003: Valid Accounts: Local Accounts, adversaries can gain unauthorized access to target systems, escalate privileges, and maintain a persistent presence within the target network. They can utilize various techniques to identify, compromise, and exploit local accounts, such as password attacks, credential dumping, and social engineering, which enable them to obtain valid credentials. Once they have acquired these credentials, adversaries can move laterally within the network, access sensitive information, and carry out further attacks with minimal detection. The exploitation of local accounts also allows adversaries to masquerade as legitimate users, which makes it more challenging for security professionals to identify and remediate malicious activities. Overall, leveraging valid local accounts enables adversaries to conduct sophisticated cyber operations while remaining undetected, thereby significantly increasing the potential impact of their attacks.