Time
8 hours 28 minutes
Difficulty
Beginner
CEU/CPE
10

Video Transcription

00:00
Hello and congratulations on the completion of the credential access module of the application of the minor attack family discussions. So what should we know at this point in our learning? Well,
00:16
we talked about potential access, and this particular phase of minor is wind at threat. Actor attempts
00:22
to steal account names and passwords. And again, those techniques used were kilo being credential dumping and stealing from Web browsers. Now we also went over another. A number of areas such as Bash history and how credentials can end up in a bass history found
00:38
we looked at brute forcing as a means of using password lists and things that nature to guest credentials.
00:43
We did credential dumping discussions as faras how a user would go about
00:49
having those dumped from a D or something of that nature stealing hashes and then stealing Web session cookies from browsers and things that nature. And of course, we went through mitigation techniques for all these areas as well. So congratulations again. And with that, I thank you for your town today and I look forward to seeing you again

Up Next

Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By

Instructor Profile Image
Robert Smith
Director of Security Services at Corsica
Instructor