Hacking: A cracker can attack a password by using various techniques including dictionary attacks, or brute force attacks to investigate logins that match a list of known passwords. The potential result of this is group or user accounts may be assigned an incorrect password.
Account Hacking: A threat actor may attempt to bypass a user account’s security controls and take over administrative rights using the account username and password, an attack known as account hijacking. Although an account is generally tied to a specific device, or computer, a threat actor may employ techniques to circumvent device limitations and gain administrative or elevated privileges.
Peer-to-Peer Network: Peer-to-peer refers to the sharing of information accomplished through networks. A threat actor may collaboratively exploit the lack of planning and fault tolerance tricks of a network to gain unauthorized access to data produced or stored in the environments.
Brute Force: These attacks attempt to guess a password provided by the victim. A valid password is often referenced as a golden ticket that is better than a blank ticket, since it indicates a higher probability of success. It is critical to make sure that all username and password combinations are reversed engineered during security assessments and robustly tested for resilience against automated and human derived password lists.
Elevated Privileges: A threat actor may attempt to exploit an account, gaining elevated privileges to hide their activities and gain persistence in the environment. However, if the attacker is able to obtain elevated privileges; it can cause numerous problems within the organization. This includes acting against the interests of an organization, and otherwise harming its reputation. d2c66b5586