Skip to content

Commit bf74c8f

Browse files
committed
Docs: Expand the explanation of credentials collectors
1 parent 4d60ee9 commit bf74c8f

File tree

1 file changed

+30
-9
lines changed
  • docs/content/features/credentials_collectors

1 file changed

+30
-9
lines changed

docs/content/features/credentials_collectors/_index.md

+30-9
Original file line numberDiff line numberDiff line change
@@ -6,17 +6,38 @@ pre: "<i class='fas fa-key'></i> "
66

77
# Credentials Collectors
88

9-
## <!-- we just need this here for formatting preferences done with CSS -->
9+
Credentials Collectors attempt to steal credentials from systems that the
10+
Infection Monkey Agent has infected.
1011

11-
In real-world network attacks, malicious actors often adopt methods to extract
12-
credentials from compromised systems. Stolen credentials enable the attackers
13-
to further breach the environment in many ways including lateral movement,
14-
privilege escalation, data theft, and persistence.
12+
## Mimicking attackers
1513

16-
Infection Monkey has multiple credentials collectors that steal credentials from
17-
compromised machines similarly. These credentials are used during exploitation
18-
for brute-forcing.
14+
In real-world network attacks, malicious actors often attempt to extract
15+
credentials from compromised systems. Stolen credentials enable attackers to
16+
penetrate deeper into the environment in many ways, such as lateral movement,
17+
privilege escalation, data theft, and persistence. To mimic this behavior,
18+
Infection Monkey has multiple plugins, called "credentials collectors", that
19+
steal credentials from compromised hosts.
1920

20-
Infection Monkey provides the following credentials collectors:
21+
## How credentials collectors work
22+
23+
When an Infection Monkey Agent is started, it begins the reconnaissance phase
24+
of its attack. The first step in this phase is to use all enabled credentials
25+
collectors to steal credentials. Any stolen credentials are then sent to the
26+
Monkey Island, where they become immediately available for any Agent to use.
27+
28+
After the reconnaissance phase, the Agent will begin the propagation phase and
29+
attempt to compromise other hosts on the network. Exploiters are Infection
30+
Monkey plugins that attempt to spread copies of the Agent throughout the
31+
network. Some exploiters can use the credentials stolen by credentials
32+
collectors to gain access to other systems on the network. First, the exploiter
33+
will query the Monkey Island to retrieve credentials that were configured by
34+
the user and any credentials that were stolen by credentials collectors. Next,
35+
the exploiters will use the stolen credentials to attempt to authenticate with
36+
a target system. If authentication is successful, the exploiter will execute
37+
the Agent on the target system, spreading the infection throughout the network.
38+
39+
## Techniques
40+
To read more about the techniques Infection Monkey can use to steal
41+
credentials, click the links below:
2142

2243
{{% children /%}}

0 commit comments

Comments
 (0)