Module 7 Summary

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with

Already have an account? Sign In »

8 hours 28 minutes
Video Transcription
Hello and congratulations on the completion of the credential access module of the application of the minor attack family discussions. So what should we know at this point in our learning? Well,
we talked about potential access, and this particular phase of minor is wind at threat. Actor attempts
to steal account names and passwords. And again, those techniques used were kilo being credential dumping and stealing from Web browsers. Now we also went over another. A number of areas such as Bash history and how credentials can end up in a bass history found
we looked at brute forcing as a means of using password lists and things that nature to guest credentials.
We did credential dumping discussions as faras how a user would go about
having those dumped from a D or something of that nature stealing hashes and then stealing Web session cookies from browsers and things that nature. And of course, we went through mitigation techniques for all these areas as well. So congratulations again. And with that, I thank you for your town today and I look forward to seeing you again
Up Next
Application of the MITRE ATT&CK Framework

This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors.

Instructed By