Posts

DISTRIBUTING THE ATTACK CHAIN THROUGH DETECTING CREDENTIAL DUMPING

An attack chain comes with it a number of steps and sequential processes. Credential dumping being crucial,  it is vital for troubleshooting its presence early enough. Once an attack to a system is launched, the attacker sets foot into the system and laterally moves within identifying their target. During this lateral movement is  when the attacker gets passwords and logins of the administrator account first, a process known as privilege  escalation. Once these privileges are acquired, the attacker is therefore at a position to access even the most  sensitive information in the system using credential dumping methods. Privilege escalation is always  performed before any credential dumping attempts. Detecting, monitoring, and blocking of any attacker's lateral movement is vital thereof. To do this, powerful   technology is necessary. Across all control points. Norton security offers detailed defense under the auspices  of its portfolio as a defense ...