@@ -6,17 +6,38 @@ pre: "<i class='fas fa-key'></i> "
6
6
7
7
# Credentials Collectors
8
8
9
- ## <!-- we just need this here for formatting preferences done with CSS -->
9
+ Credentials Collectors attempt to steal credentials from systems that the
10
+ Infection Monkey Agent has infected.
10
11
11
- In real-world network attacks, malicious actors often adopt methods to extract
12
- credentials from compromised systems. Stolen credentials enable the attackers
13
- to further breach the environment in many ways including lateral movement,
14
- privilege escalation, data theft, and persistence.
12
+ ## Mimicking attackers
15
13
16
- Infection Monkey has multiple credentials collectors that steal credentials from
17
- compromised machines similarly. These credentials are used during exploitation
18
- for brute-forcing.
14
+ In real-world network attacks, malicious actors often attempt to extract
15
+ credentials from compromised systems. Stolen credentials enable attackers to
16
+ penetrate deeper into the environment in many ways, such as lateral movement,
17
+ privilege escalation, data theft, and persistence. To mimic this behavior,
18
+ Infection Monkey has multiple plugins, called "credentials collectors", that
19
+ steal credentials from compromised hosts.
19
20
20
- Infection Monkey provides the following credentials collectors:
21
+ ## How credentials collectors work
22
+
23
+ When an Infection Monkey Agent is started, it begins the reconnaissance phase
24
+ of its attack. The first step in this phase is to use all enabled credentials
25
+ collectors to steal credentials. Any stolen credentials are then sent to the
26
+ Monkey Island, where they become immediately available for any Agent to use.
27
+
28
+ After the reconnaissance phase, the Agent will begin the propagation phase and
29
+ attempt to compromise other hosts on the network. Exploiters are Infection
30
+ Monkey plugins that attempt to spread copies of the Agent throughout the
31
+ network. Some exploiters can use the credentials stolen by credentials
32
+ collectors to gain access to other systems on the network. First, the exploiter
33
+ will query the Monkey Island to retrieve credentials that were configured by
34
+ the user and any credentials that were stolen by credentials collectors. Next,
35
+ the exploiters will use the stolen credentials to attempt to authenticate with
36
+ a target system. If authentication is successful, the exploiter will execute
37
+ the Agent on the target system, spreading the infection throughout the network.
38
+
39
+ ## Techniques
40
+ To read more about the techniques Infection Monkey can use to steal
41
+ credentials, click the links below:
21
42
22
43
{{% children /%}}
0 commit comments