Exfiltration Over Alternative Protocol: Asymmetric Encrypted Non-C2 Protocol
Course Content
By mastering T1078.003: Valid Accounts: Local Accounts, adversaries can gain unauthorized access to target systems, escalate privileges, and maintain a persistent presence within the target network. They can utilize various techniques to identify, compromise, and exploit local accounts, such as password attacks, credential dumping, and social engineering, which enable them to obtain valid credentials. Once they have acquired these credentials, adversaries can move laterally within the network, access sensitive information, and carry out further attacks with minimal detection. The exploitation of local accounts also allows adversaries to masquerade as legitimate users, which makes it more challenging for security professionals to identify and remediate malicious activities. Overall, leveraging valid local accounts enables adversaries to conduct sophisticated cyber operations while remaining undetected, thereby significantly increasing the potential impact of their attacks.