{"id":1218,"date":"2023-12-02T12:09:27","date_gmt":"2023-12-02T04:09:27","guid":{"rendered":"https:\/\/www.ruianding.com\/blog\/?p=1218"},"modified":"2023-12-06T21:59:47","modified_gmt":"2023-12-06T13:59:47","slug":"attck-for-enterprise-credential-access","status":"publish","type":"post","link":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/","title":{"rendered":"ATT&#038;CK for Enterprise &#8211; TA0006 Credential Access"},"content":{"rendered":"\n<p><a href=\"https:\/\/attack.mitre.org\/tactics\/TA0006\/\">Credential Access, Tactic TA0006 &#8211; Enterprise | MITRE ATT&amp;CK\u00ae<\/a><\/p>\n\n\n\n<p><strong>&#8220;Credential Access&#8221;<\/strong> in cybersecurity refers to the methods and techniques used by attackers to obtain user credentials, like usernames and passwords, from a system or network. This can include <strong>stealing<\/strong>, <strong>guessing<\/strong>, or <strong>forging credentials<\/strong> to gain unauthorized access to systems and data. Techniques like keylogging, phishing, credential dumping, and exploiting system vulnerabilities are commonly used. The aim is to gain access to restricted areas, escalate privileges, or move laterally within a network. This blog will explore and categorize specific alerts from <a rel=\"noreferrer noopener\" href=\"https:\/\/learn.microsoft.com\/en-us\/defender-for-identity\/credential-access-alerts\" target=\"_blank\">Credential access alerts <\/a>documentation.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"2493\" height=\"908\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-1.png\" alt=\"\" class=\"wp-image-1259\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><a href=\"https:\/\/attack.mitre.org\/techniques\/T1110\/\" data-type=\"URL\" data-id=\"https:\/\/attack.mitre.org\/techniques\/T1110\/\" target=\"_blank\" rel=\"noreferrer noopener\">T1110 Brute Force<\/a><\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td><strong>External ID<\/strong><\/td><td><strong>Name<\/strong><\/td><td><strong>Sev.<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Description<\/strong><\/td><\/tr><tr><td>2004<\/td><td>Suspected Brute Force attack (LDAP)<\/td><td>Medium<\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Brute Force Nature<\/strong>: The attacker tries numerous passwords across various accounts to find a correct one. This is a trial-and-error method aimed at gaining unauthorized access.<br><strong>LDAP Simple Bind<\/strong> \u2460: The attack involves the LDAP simple bind process, a basic method for authenticating LDAP clients to servers. <br><strong>Attack Patterns<\/strong>:<br>Either <strong>Horizontal Attack<\/strong> \u2461 or <strong>Vertical Attack<\/strong> \u2462, it also can be the <strong>combination<\/strong> of both.<br><strong>Detection Mechanism<\/strong>:<br>This type of attack is detected by &#8220;Defender for Identity&#8221; when there is an unusually high number of simple bind authentication attempts.<br>Detection is based on authentication events recorded by sensors on domain controllers and AD FS servers \u2463.<br><strong>Impact<\/strong>:<br>If successful, the attacker gains access to at least one account, potentially compromising system security and allowing for unauthorized activities.<\/td><\/tr><tr><td>2023<\/td><td>Suspected Brute Force attack (Kerberos, NTLM) <\/td><td>Medium<\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Attack Method<\/strong>: The attacker tries multiple passwords on different accounts to find a correct one, or employs a password spray, using one password against many accounts.<br><strong>Attack Patterns<\/strong>:<br>Either <strong>Horizontal Attack<\/strong> or <strong>Vertical Attack<\/strong>, it also can be the <strong>combination<\/strong> of both.<br><strong>Attack Strategy<\/strong>:<br>Attackers often wait for a period (e.g., 30 minutes) between <strong>password spray<\/strong> \u2464 attempts to avoid triggering account lockout mechanisms.<br><strong>Purpose and Efficacy<\/strong>:<br>These attacks are effective for gaining initial access to an organization and facilitating lateral movements or privilege escalation.<br><strong>Detection<\/strong>:<br>An alert is triggered after observing many authentication failures or detecting a password spray. The minimum period for triggering an alert is one week \u2465<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background has-small-font-size\">\u2460 <strong>LDAP Simple Bind<\/strong>: This method involves sending the user&#8217;s <strong>Distinguished Name (DN)<\/strong> and <strong>password<\/strong> in plain text to the LDAP server. The server then verifies these credentials against its directory to authenticate the user.<br>LDAP simple bind is necessary because it provides a straightforward and widely-supported mechanism for user authentication. It allows for easy integration of various applications and services with directory services for user verification.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background has-small-font-size\">\u2461 <strong>Horizontal Brute-Force<\/strong>: This involves using a small set of passwords and trying them on many different user accounts. The attacker is not targeting a specific user but rather attempting to find any weak account.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background has-small-font-size\">\u2462 <strong>Vertical Brute-Force<\/strong>: This method uses a large set of different passwords but targets just a few users. The aim here is to crack the password of a specific account or a small number of accounts, possibly with higher privileges.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background has-small-font-size\">\u2463 <strong>User Authentication<\/strong>: ADFS can use LDAP simple bind to authenticate users against an AD domain. This is particularly common in environments where ADFS is configured to <strong>use AD as its identity store<\/strong>.<br><strong>Integration with AD<\/strong>: LDAP is a native protocol for interacting with AD. Using LDAP simple bind, ADFS can efficiently query AD for user credentials and other directory information necessary for authentication and authorization processes.<\/p>\n\n\n\n<p class=\"has-pale-pink-background-color has-background has-small-font-size\">\u2464 <a rel=\"noreferrer noopener\" href=\"https:\/\/attack.mitre.org\/techniques\/T1110\/003\/\" target=\"_blank\">T1110.003 Password Spraying<\/a> A Password Spray Attack is a type of cyber attack where an attacker <strong>uses a common<\/strong>, <strong>weak password<\/strong> to attempt to log into <strong>a large number of different accounts<\/strong>. This approach differs from traditional brute force attacks by targeting many accounts with a few passwords, rather than many passwords on a single account. <strong>Key aspects: Single password, mutiple accounts; evading lockout policies; periodic attempts<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background has-small-font-size\">\u2465 The differing detection times for NTLM\/Kerberos and LDAP brute force attacks are due to their distinct attack patterns and protocol characteristics. <strong>NTLM\/Kerberos attacks are typically more complex and stealthier<\/strong>, involving slow, low-volume attempts that blend in with normal traffic, necessitating a longer period (about a week) for systems to learn and establish a baseline of normal behavior to identify anomalies. In contrast, <strong>LDAP brute force attacks are generally more straightforward and less sophisticated<\/strong>, with attackers quickly trying multiple passwords, resulting in a clear attack signature that is easier to detect in a shorter timeframe.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1555\" data-type=\"URL\" data-id=\"https:\/\/attack.mitre.org\/techniques\/T1555\" target=\"_blank\" rel=\"noreferrer noopener\">T1555 Credentials from Password Stores<\/a><\/h3>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td><strong>External ID<\/strong><\/td><td><strong>Name<\/strong><\/td><td><strong>Sev.<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Description<\/strong><\/td><\/tr><tr><td>2020<\/td><td>Malicious request of Data Protection API master key<\/td><td><strong>High<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Target on DPAPI<\/strong>: DPAPI is integral to Windows security, protecting <strong>password or sensitive data<\/strong> \u2460 saved by browsers and other sensitive files.<br><strong>Master Key Vulnerability<\/strong>: In this attack, the focus is on the <strong>master key <\/strong>\u2461<strong> backup<\/strong> held by domain controllers. This key is capable of decrypting all data protected by DPAPI on machines within a domain.<br><strong>Attack Mechanism<\/strong>: Attackers aim to acquire this master key, which would allow them to decrypt any DPAPI-protected secrets across all domain-joined Windows machines.<br><strong>Detection and Alerting<\/strong>: An alert is triggered in Microsoft&#8217;s Defender for Identity system when there&#8217;s an attempt to retrieve this backup master key, signaling a potential malicious activity.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background has-small-font-size\">\u2460 <strong>Passwords and Secrets:<\/strong> DPAPI is commonly used to encrypt and protect passwords and other secrets stored on a Windows system.<br><strong>Generic Data Encryption:<\/strong> Beyond just passwords, DPAPI can also be used to encrypt any kind of sensitive data. This includes cryptographic keys, connection strings, or any data that an application deems confidential.<\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background has-small-font-size\">\u2461 <strong>Storage Path:<\/strong> The DPAPI master key is typically stored in the user&#8217;s profile configuration files, specifically within the user&#8217;s profile directory. For machines joined to a domain, the path is typically as follows:<strong> C:\\Users[Username]\\AppData\\Roaming\\Microsoft\\Protect\\<\/strong><br>In this directory, there will be one or more folders named with GUIDs, and each folder represents a specific User Security ID (SID). These folders store the encrypted master key.<br><strong>User Credential Encryption: <\/strong>The DPAPI master key is encrypted using the user&#8217;s login credentials. For users in a domain environment, this typically involves the user&#8217;s NTLM hash or Kerberos ticket.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image.png\" alt=\"\" class=\"wp-image-1251\" width=\"633\" height=\"137\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1558\" data-type=\"URL\" data-id=\"https:\/\/attack.mitre.org\/techniques\/T1558\" target=\"_blank\" rel=\"noreferrer noopener\">T1558 Steal or Forge Kerberos Tickets<\/a><\/h3>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td><strong>External ID<\/strong><\/td><td><strong>Name<\/strong><\/td><td><strong>Sev.<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Description<\/strong><\/td><\/tr><tr><td>2013<\/td><td>Suspected Golden Ticket usage (forged authorization data)<\/td><td><strong>High<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Exploiting Vulnerabilities<\/strong>: It targets known weaknesses in older Windows Server systems.<br><strong>Manipulation of PAC<\/strong>: Attackers manipulate the Privileged Attribute Certificate (PAC), a component of the Kerberos ticket in Active Directory. PAC carries user authorization data, like group memberships.<br><strong>Unauthorized Privilege Escalation<\/strong>: By altering the PAC, attackers grant themselves additional privileges within the network, potentially gaining unauthorized access to sensitive areas and data.<\/td><\/tr><tr><td>2410<\/td><td>Suspected Kerberos SPN exposure<\/td><td><strong>High<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Enumerating SPNs<\/strong>: Attackers use tools to list service accounts and their Service Principal Names (SPNs), which are unique identifiers for each service in a Kerberos-authenticated network.<br><strong>Requesting Kerberos Tickets<\/strong>: They then request Kerberos service tickets for these identified services.<br><strong>Capturing and Exploiting TGS Tickets<\/strong>: The attackers capture Ticket Granting Service (TGS) tickets from the network&#8217;s memory and extract their hashes.<br><strong>Offline Brute Force Attack<\/strong>: These extracted hashes are saved for conducting offline brute force attacks, where attackers attempt to crack the passwords without risking detection by the network\u2019s security systems.<\/td><\/tr><tr><td>2412<\/td><td>Suspected AS-REP Roasting attack<\/td><td><strong>High<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Targeting Specific Accounts<\/strong>: The attack focuses on accounts that have Kerberos preauthentication disabled. Preauthentication is an additional security measure in Kerberos.<br><strong>Sending AS-REQ Requests<\/strong>: Attackers send Authentication Service Request (AS-REQ) messages to the Kerberos service without the required encrypted timestamp.<br><strong>Receiving AS-REP Messages<\/strong>: In response to these requests, they receive Authentication Service Response (AS-REP) messages that contain Ticket Granting Ticket (TGT) data.<br><strong>Exploiting Insecure Encryption<\/strong>: The TGT data might be encrypted with weaker algorithms like RC4, making it more susceptible to attacks.<br><strong>Offline Password Cracking<\/strong>: Attackers save the received data for later use in offline password cracking attacks, where they attempt to decipher the encrypted credentials without alerting the network&#8217;s security mechanisms.<br><strong>Exposing Plaintext Credentials<\/strong>: The ultimate goal is to extract plaintext credentials, similar to a Kerberoasting attack, but targeting a different aspect of the Kerberos protocol.<\/td><\/tr><tr><td>2419<\/td><td>Suspicious modification of a sAMNameAccount attribute (CVE-2021-42278 and CVE-2021-42287 exploitation)<\/td><td><strong>High<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Attack Context<\/strong>:<br>The attack occurs in Active Directory environments that have not been patched against specific vulnerabilities.<br>It allows attackers to escalate their privileges to that of a Domain Admin.<br><strong>Mechanism of the Attack<\/strong>:<br>The attacker initially compromises a regular user account in the domain.<br>During Kerberos authentication, when a Ticket-Granting-Service (TGS) ticket is requested, the Key Distribution Center (KDC) tries to locate the account associated with the request.<br>If the requested account is not found, the KDC searches again, this time appending a trailing &#8220;$&#8221; to the account name.<br>The attacker exploits this by creating a situation where the KDC fails to find the initially requested account but succeeds when the trailing &#8220;$&#8221; is added. This is achieved by manipulating the sAMAccountName attribute.<br>As a result, the KDC issues a TGS ticket with the privileges of the manipulated account, essentially granting the attacker Domain Admin privileges.<br><strong>Exploiting Specific Vulnerabilities<\/strong>:<br>The attack specifically <a rel=\"noreferrer noopener\" href=\"https:\/\/zhuanlan.zhihu.com\/p\/456718900\" target=\"_blank\">exploits CVE-2021-42278 and CVE-2021-42287<\/a>, vulnerabilities in the way Active Directory handles account lookups.<br>By leveraging these vulnerabilities, an attacker with basic domain user credentials can elevate their access to that of a domain admin.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/attack.mitre.org\/techniques\/T1552\" target=\"_blank\" rel=\"noreferrer noopener\">T1552 Unsecured Credentials<\/a><\/h3>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td><strong>External ID<\/strong><\/td><td><strong>Name<\/strong><\/td><td><strong>Sev.<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Description<\/strong><\/td><\/tr><tr><td>2413<\/td><td>Suspected AD FS DKM key read<\/td><td><strong>High<\/strong><\/td><td class=\"has-text-align-left\" data-align=\"left\"><strong>Targeting AD FS Configuration<\/strong>:<br>The attack focuses on the AD FS configuration database, which stores critical security elements like the token signing and token decryption certificates, along with the private keys of AD FS.<br><strong>Role of DKM Keys<\/strong>:<br>These certificates and keys are encrypted using a technology called <strong>Distributed Key Manager (DKM)<\/strong> \u2460.<br>AD FS uses these DKM keys for its operations, particularly for creating and verifying security tokens.<br><strong>Attack Mechanism<\/strong>:<br>The attacker aims to access these DKM keys. Possessing these keys would allow the attacker to decrypt the certificates that are used for signing SAML tokens.<br>This type of attack is akin to the Golden Ticket attack but targets the SAML tokens instead of Kerberos tickets.<br><strong>Purpose of the Attack<\/strong>:<br>By gaining access to these private keys, the attacker can perform actions like the Golden SAML attack, creating SAML tokens that can be used to impersonate any user and gain unauthorized access across federated services.<br><strong>Detection Efforts<\/strong>:<br>The security systems in place attempt to detect any unauthorized attempts to access or read the DKM keys within the AD FS environment.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background has-small-font-size\">\u2460 <strong>Decryption Key Management (DKM)<\/strong> can be understood as a kind of container or storage mechanism for encryption keys. It&#8217;s a critical component for securely handling the keys used by ADFS, particularly for encrypting and decrypting tokens.<br>Physically, the DKM is not located as a standalone entity or file within the ADFS infrastructure. Instead, it&#8217;s integrated into the Active Directory (AD) environment. The DKM stores its keys in the AD database, specifically within the configuration partition. This storage is typically done in the form of objects in the AD.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1381\" height=\"262\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-3.png\" alt=\"\" class=\"wp-image-1264\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Other combined Tactics<\/h3>\n\n\n\n<figure class=\"wp-block-table is-style-stripes has-small-font-size\"><table><tbody><tr><td><strong>External ID<\/strong><\/td><td><strong>Name<\/strong><\/td><td><strong>Sev.<\/strong><\/td><td><strong>Description<\/strong><\/td><\/tr><tr><td>2047<\/td><td>Suspected rogue Kerberos certificate usage<\/td><td><strong>High<\/strong><\/td><td><strong>Objective<\/strong>: The primary goal of this reconnaissance is to <strong>map the domain structure and identify privileged accounts,<\/strong> which can be crucial for attackers planning subsequent stages of their attack, often referred to as the &#8220;attack kill chain.&#8221;<br><strong>Method<\/strong>: Attackers use LDAP both for legitimate administrative purposes and for malicious reconnaissance.<br><strong>First Phase of Kerberoasting Attacks<\/strong>: This LDAP-focused reconnaissance is often the initial step in <strong>Kerberoasting attacks<\/strong>. In Kerberoasting, attackers aim to compile a list of Security Principal Names (SPNs) and subsequently attempt to acquire Ticket Granting Server (TGS) tickets for these SPNs, which can be cracked offline to reveal service account credentials.<br><strong>Detection and Learning Period<\/strong>: To differentiate between legitimate and suspicious activities, Defender for Identity does not trigger alerts for this type of activity during the first 10 days after its deployment. This period allows Defender for Identity to learn and profile normal user behaviors. After this initial learning phase, alerts are generated for computers performing unusual LDAP enumeration queries or targeting sensitive groups using methods that have not been observed before.<\/td><\/tr><tr><td>2006<\/td><td>Suspected DCSync attack (replication of directory services)&nbsp;<\/td><td><strong>High<\/strong><\/td><td><strong>Malicious Replication Requests<\/strong>: In a DCSync attack, an attacker exploits the <strong>AD replication process<\/strong> \u2461. They simulate the behavior of a domain controller and initiate a replication request from a non-DC computer.<br><strong>Data Exfiltration<\/strong>: By doing this, the attacker can potentially retrieve sensitive data from the AD, including <strong>password hashes<\/strong> and other <strong>critical security information<\/strong>.<br><strong>Permissions Required<\/strong>: This type of attack typically requires that the attacker has already gained high-level permissions (like those of a Domain Administrator) to successfully initiate the replication request.<\/td><\/tr><tr><td>2014<\/td><td>Honeytoken authentication activity<\/td><td>Medium<\/td><td><strong>Honeytoken Authentication as a Red Flag<\/strong>: Any sign of activity on a honeytoken account is a strong indicator of malicious behavior and warrants immediate investigation.<br><strong>Proactive Security Measure<\/strong>: Using honeytokens is a strategic way to <strong>lure potential attackers<\/strong> and detect them early in their attempts to breach the network.<br><strong>Monitoring and Response<\/strong>: Organizations should closely monitor these accounts and have protocols in place to respond swiftly if they detect activity.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background has-small-font-size\">\u2460 <strong>&#8220;Security principal&#8221;<\/strong> typically refers to <strong>users, groups, and service accounts<\/strong> within the domain, each of which has a unique identity and security-related attributes. <br>Security Principal Reconnaissance (LDAP) is when attackers use <strong>LDAP queries<\/strong> to gather information (<strong>SPNs<\/strong>) about security principals in the domain environment, <strong>providing essential data support for subsequent attacks like Kerberoasting<\/strong>.<\/p>\n\n\n\n<p class=\"has-pale-cyan-blue-background-color has-background has-small-font-size\">In a <strong>Kerberos Roasting attack<\/strong>, attackers typically use already obtained user credentials to request service tickets. <strong>&#8220;Roasting&#8221;<\/strong> refers to the process of offline cracking of the service tickets. Since these service tickets are encrypted with the password associated with the service account, attackers can attempt to crack these tickets offline to obtain the service account&#8217;s password. The effectiveness of this attack largely depends on the strength and complexity of the service account&#8217;s password.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-2.png\" alt=\"\" class=\"wp-image-1262\" width=\"685\" height=\"526\"\/><\/figure>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background has-small-font-size\">\u2461 <strong>Active Directory replication<\/strong> is a process where changes made on one DC are synchronized across all other DCs in the network. This ensures consistency of data, including user credentials and policy settings, across the network.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Credential Access, Tactic TA0006 &#8211; Enterprise | MITRE ATT&amp;CK\u00ae &#8220;Credential Access&#8221; in cybersecurity refers to the methods and techniques used by attackers to obtain user credentials, like usernames and passwords, from a system or network. This can include stealing, guessing, or forging credentials to gain unauthorized access to systems and data. Techniques like keylogging, phishing, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[50],"tags":[],"class_list":["post-1218","post","type-post","status-publish","format-standard","hentry","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ATT&amp;CK for Enterprise - TA0006 Credential Access - \u6781\u7b80IT\uff5cSimpleIT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ATT&amp;CK for Enterprise - TA0006 Credential Access - \u6781\u7b80IT\uff5cSimpleIT\" \/>\n<meta property=\"og:description\" content=\"Credential Access, Tactic TA0006 &#8211; Enterprise | MITRE ATT&amp;CK\u00ae &#8220;Credential Access&#8221; in cybersecurity refers to the methods and techniques used by attackers to obtain user credentials, like usernames and passwords, from a system or network. This can include stealing, guessing, or forging credentials to gain unauthorized access to systems and data. Techniques like keylogging, phishing, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/\" \/>\n<meta property=\"og:site_name\" content=\"\u6781\u7b80IT\uff5cSimpleIT\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-02T04:09:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-06T13:59:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2493\" \/>\n\t<meta property=\"og:image:height\" content=\"908\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ruian Ding\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ruian Ding\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/\"},\"author\":{\"name\":\"Ruian Ding\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\"},\"headline\":\"ATT&#038;CK for Enterprise &#8211; TA0006 Credential Access\",\"datePublished\":\"2023-12-02T04:09:27+00:00\",\"dateModified\":\"2023-12-06T13:59:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/\"},\"wordCount\":2328,\"publisher\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\"},\"image\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-1.png\",\"articleSection\":[\"CyberSecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/\",\"url\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/\",\"name\":\"ATT&CK for Enterprise - TA0006 Credential Access - \u6781\u7b80IT\uff5cSimpleIT\",\"isPartOf\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-1.png\",\"datePublished\":\"2023-12-02T04:09:27+00:00\",\"dateModified\":\"2023-12-06T13:59:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/#primaryimage\",\"url\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-1.png\",\"contentUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-1.png\",\"width\":2493,\"height\":908},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ruianding.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ATT&#038;CK for Enterprise &#8211; TA0006 Credential Access\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/#website\",\"url\":\"https:\/\/www.ruianding.com\/blog\/\",\"name\":\"Ruian's Tech Troubleshooting Toolbox\",\"description\":\"Debug the World.\",\"publisher\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\"},\"alternateName\":\"\u4e01\u777f\u5b89\u7684\u6280\u672f\u5206\u4eab\u535a\u5ba2\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ruianding.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b\",\"name\":\"Ruian Ding\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png\",\"contentUrl\":\"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png\",\"width\":284,\"height\":284,\"caption\":\"Ruian Ding\"},\"logo\":{\"@id\":\"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/\"},\"description\":\"I am currently a Support Specialist at NIO, focusing on cloud-related issues for NIO Power. Previously, at Microsoft Entra ID, I specialized in identity and access management (IAM), including device registration, Windows Hello for Business (WHfB), multi-factor authentication (MFA), and single sign-on (SSO). In addition to my core expertise, I have a strong foundation in Active Directory, Servers, Cloud Computing, Network Administration, and Front-end Web Development. This diverse technical skill set enables me to effectively handle a wide range of challenges in a fast-paced IT environment.\",\"sameAs\":[\"https:\/\/www.ruianding.com\"],\"url\":\"https:\/\/www.ruianding.com\/blog\/author\/ruiand\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ATT&CK for Enterprise - TA0006 Credential Access - \u6781\u7b80IT\uff5cSimpleIT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/","og_locale":"en_US","og_type":"article","og_title":"ATT&CK for Enterprise - TA0006 Credential Access - \u6781\u7b80IT\uff5cSimpleIT","og_description":"Credential Access, Tactic TA0006 &#8211; Enterprise | MITRE ATT&amp;CK\u00ae &#8220;Credential Access&#8221; in cybersecurity refers to the methods and techniques used by attackers to obtain user credentials, like usernames and passwords, from a system or network. This can include stealing, guessing, or forging credentials to gain unauthorized access to systems and data. Techniques like keylogging, phishing, [&hellip;]","og_url":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/","og_site_name":"\u6781\u7b80IT\uff5cSimpleIT","article_published_time":"2023-12-02T04:09:27+00:00","article_modified_time":"2023-12-06T13:59:47+00:00","og_image":[{"width":2493,"height":908,"url":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-1.png","type":"image\/png"}],"author":"Ruian Ding","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ruian Ding","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/#article","isPartOf":{"@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/"},"author":{"name":"Ruian Ding","@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b"},"headline":"ATT&#038;CK for Enterprise &#8211; TA0006 Credential Access","datePublished":"2023-12-02T04:09:27+00:00","dateModified":"2023-12-06T13:59:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/"},"wordCount":2328,"publisher":{"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b"},"image":{"@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-1.png","articleSection":["CyberSecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/","url":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/","name":"ATT&CK for Enterprise - TA0006 Credential Access - \u6781\u7b80IT\uff5cSimpleIT","isPartOf":{"@id":"https:\/\/www.ruianding.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/#primaryimage"},"image":{"@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-1.png","datePublished":"2023-12-02T04:09:27+00:00","dateModified":"2023-12-06T13:59:47+00:00","breadcrumb":{"@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/#primaryimage","url":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-1.png","contentUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/12\/image-1.png","width":2493,"height":908},{"@type":"BreadcrumbList","@id":"https:\/\/www.ruianding.com\/blog\/attck-for-enterprise-credential-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ruianding.com\/blog\/"},{"@type":"ListItem","position":2,"name":"ATT&#038;CK for Enterprise &#8211; TA0006 Credential Access"}]},{"@type":"WebSite","@id":"https:\/\/www.ruianding.com\/blog\/#website","url":"https:\/\/www.ruianding.com\/blog\/","name":"Ruian's Tech Troubleshooting Toolbox","description":"Debug the World.","publisher":{"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b"},"alternateName":"\u4e01\u777f\u5b89\u7684\u6280\u672f\u5206\u4eab\u535a\u5ba2","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ruianding.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/440d88575b7dc819a4cefc8c4199db3b","name":"Ruian Ding","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png","contentUrl":"https:\/\/www.ruianding.com\/blog\/wp-content\/uploads\/2023\/05\/logo.png","width":284,"height":284,"caption":"Ruian Ding"},"logo":{"@id":"https:\/\/www.ruianding.com\/blog\/#\/schema\/person\/image\/"},"description":"I am currently a Support Specialist at NIO, focusing on cloud-related issues for NIO Power. Previously, at Microsoft Entra ID, I specialized in identity and access management (IAM), including device registration, Windows Hello for Business (WHfB), multi-factor authentication (MFA), and single sign-on (SSO). In addition to my core expertise, I have a strong foundation in Active Directory, Servers, Cloud Computing, Network Administration, and Front-end Web Development. This diverse technical skill set enables me to effectively handle a wide range of challenges in a fast-paced IT environment.","sameAs":["https:\/\/www.ruianding.com"],"url":"https:\/\/www.ruianding.com\/blog\/author\/ruiand\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts\/1218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/comments?post=1218"}],"version-history":[{"count":37,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts\/1218\/revisions"}],"predecessor-version":[{"id":1383,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/posts\/1218\/revisions\/1383"}],"wp:attachment":[{"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/media?parent=1218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/categories?post=1218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ruianding.com\/blog\/wp-json\/wp\/v2\/tags?post=1218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}