2020-08-13 21:34:35 +08:00
---
2020-10-23 22:46:23 +08:00
title: "Credentials Leak"
2020-08-13 21:34:35 +08:00
date: 2020-08-12T13:04:25+03:00
2020-08-26 16:51:38 +08:00
draft: false
2020-10-23 17:30:38 +08:00
description: "Assess the impact of a successful phishing attack, insider threat, or other form of credentials leak."
2020-10-23 22:46:23 +08:00
weight: 5
2020-08-13 21:34:35 +08:00
---
2021-07-28 19:21:27 +08:00
## Overview
2020-08-13 21:34:35 +08:00
2021-07-28 19:21:27 +08:00
Numerous attack techniques (from phishing to dumpster diving) might result in a credential leak,
2022-08-10 20:34:13 +08:00
which can be **extremely costly** as demonstrated in our report [IResponse to IEncrypt ](https://web.archive.org/web/20210117224801/https://www.guardicore.com/2019/04/iresponse-to-iencrypt/ ).
2020-08-13 21:34:35 +08:00
2021-07-28 19:21:27 +08:00
The Infection Monkey can help you assess the impact of stolen credentials by automatically searching
2021-02-22 20:06:56 +08:00
where bad actors can reuse these credentials in your network.
2020-08-13 21:34:35 +08:00
## Configuration
2021-07-28 19:21:27 +08:00
- **Exploits -> Credentials** After setting up the Monkey Island, add your users' **real** credentials
2021-02-22 20:06:56 +08:00
(usernames and passwords) here. Don't worry; this sensitive data is not accessible, distributed or used in any way other than being sent to the Infection Monkey agents. You can easily eliminate it by resetting the configuration of your Monkey Island.
2021-07-28 19:21:27 +08:00
- **Internal -> Exploits -> SSH keypair list** When enabled, the Infection Monkey automatically gathers SSH keys on the current system.
2021-02-22 20:06:56 +08:00
For this to work, the Monkey Island or initial agent needs to access SSH key files.
To make sure SSH keys were gathered successfully, refresh the page and check this configuration value after you run the Infection Monkey
2020-08-13 21:34:35 +08:00
(content of keys will not be displayed, it will appear as `<Object>` ).
2020-10-23 17:30:38 +08:00
## Suggested run mode
2021-07-28 19:21:27 +08:00
Execute the Infection Monkey on a chosen machine in your network using the “Manual” run option.
2021-02-22 20:06:56 +08:00
Run the Infection Monkey as a privileged user to make sure it gathers as many credentials from the system as possible.
2020-08-13 21:34:35 +08:00
![Exploit password and user lists ](/images/usage/scenarios/user-password-lists.png "Exploit password and user lists" )
## Assessing results
2021-07-28 19:21:27 +08:00
To assess the impact of leaked credentials see the Security report. Examine **Security report -> Stolen credentials** to confirm.