MITRE ATT&CK – Credential Access – Keylogging
This lab incorporates a series of Mitre ATT&CK techniques and sub-techniques that show how adversaries may capture key logs through CSS injection and credentials through fake prompts.
Cyber Range
Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include keylogging or credential dumping.
The labs
MITRE ATT&CK – Credential Access – Keylogging
This lab incorporates a series of Mitre ATT&CK techniques and sub-techniques that show how adversaries may capture key logs through CSS injection and credentials through fake prompts.
MITRE ATT&CK – Credential Access – Brute Force
This lab incorporates the MITRE ATT&CK Brute Force technique.In this lab the learner will utilize utilities such as: Hydra, Patator, Medusa, Nmap, NCrack, Dirb and GoBuster
MITRE ATT&CK – Credential Access – Credentials from Password Stores
This lab incorporates a series of Mitre ATT&CK techniques and sub-techniques to show how adversaries search for common password storage locations to obtain user credentials.Locations investigated as part of this lab include Network Manager as well as browser saved passwords on both Chrome and Firefox. In addition you will learn about LaZagne which can dump all saved passwords in a system to plaintext
MITRE ATT&CK – Credential Access – Network Sniffing
This lab incorporates the MITRE ATT&CK Network Sniffing technique.This lab uses tools such as nmap, wireshark and tshark to help demonstrate these techniques.
MITRE ATT&CK – Credential Access – Web Cookies
This lab incorporates a series of Mitre ATT&CK techniques and sub-techniques to teach the learner about stealing, creating and forging cookies to gain access to web applications.The learner will use tools such as flask-unsign and sqlite3 during this lab.
MITRE ATT&CK – Credential Access – Web Portal Capture
This lab incorporates the MITRE ATT&CK Input Capture technique by injecting a JavaScript skimmer into a web application to captures user’s credentials.
We use Infosec Skills to provide continuous training to our technicians and to prepare them for various certifications. Infosec Skills allows us to create personalized training programs that focus on each of our technicians’ particular roles and see their progress as they take courses. We also, recommend it to clients to make their IT support teams better.
Caleb Yankus
This has been utilized to bridge the skills gap across our cyber team and to aid them as they prepare for their various certifications. It also has provided a nice learning foundation for our various cyber team members to utilize as we continue to find ways for cross-utilization with operations while minimizing the downtime needed to ensure everyone’s knowledge is the same.
Daniel Simpson
We use Infosec Skills to provide base level knowledge for employees. We also use the services to provide in depth learning for employees as they encounter new technologies. If an employee is is assigned to a new project, we can rely on Infosec Skills to provide a rapid concentrated learning environment. This rapid concentrated learning positions our employees for success.
Infosec Skills Teams client