What is Credential Access?
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
hello and welcome to another application of the minor attack framework discussion today. We're going to beginning into what is credential access Well, to jump right in credential access is the phase in the minor attack framework where a threat actors attempting to steal account names
00:19
on passwords. And so the primary focus here again is going to be
00:23
account names and passwords. So there are different ways in which a threat actor can get this information. A few of the primaries were going to be key logging, credential dumping and stealing from Web browsers and things of that nature. So when you get malware or some type of
00:41
script that gets run on the system, it can scrape those credentials and take that all back to whomever is trying to collect them.
00:47
So within the credential access phase of the framework, there are a few areas that will focus on with respect to getting into the particular vector and some information within it. So we're gonna talk about bash history, brute force credential dumping, and, as we mentioned stealing Web session
01:07
cookies as it's listed, it still Web session cookie.
01:10
So
01:11
those are the few areas that we're gonna hit within the credential access phase of the minor attack framework. And so what? That I want to thank you for your time today, and I look forward to seeing you again soon.
Up Next
Similar Content