Credential Access (TA0006)

DDoSPedia An Online Encyclopedia Of Cyberattack and Cybersecurity Terms

Security Research Center

At some point in a campaign, threat actors will look to harvest and steal account names. Leveraging legitimate accounts to access a target makes the anomalous behavior harder to detect and provides an opportunity to create more accounts. Threat actors can acquire credentials through techniques such as Brute Force attacks, unsecured credential stores or configuration dumps through exposed APIs or through web path traversal, network sniffing and man-in-the-middle attacks.


DDoSPedia Index

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Radware Blog
Security Research Center