Common Information
Type | Value |
---|---|
Value |
Domain Account - T1136.002 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may create a domain account to maintain access to victim systems. Domain accounts are those managed by Active Directory Domain Services where access and permissions are configured across systems and services that are part of that domain. Domain accounts can cover user, administrator, and service accounts. With a sufficient level of access, the <code>net user /add /domain</code> command can be used to create a domain account.(Citation: Savill 1999) Such accounts may be used to establish secondary credentialed access that do not require persistent remote access tools to be deployed on the system. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-01 | 0 | 4 key strategies for school ransomware prevention and response | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-11-01 | 39 | Dark Web Profile: Tropic Trooper (APT23) - SOCRadar® Cyber Intelligence Inc. | ||
Details | Website | 2024-10-25 | 6 | Cybersecurity News Review — Week 43 | ||
Details | Website | 2024-10-24 | 0 | 50,000 Files Exposed in Nidec Ransomware Attack | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-10-23 | 76 | Embargo ransomware: Rock’n’Rust | ||
Details | Website | 2024-10-21 | 0 | 50,000 Files Exposed in Nidec Ransomware Attack | ||
Details | Website | 2024-10-21 | 138 | Intro to Active Directory HTB-Academy | ||
Details | Website | 2024-10-16 | 108 | Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations | CISA | ||
Details | Website | 2024-10-09 | 2 | Enhancing AD Security Against Password Spraying Attacks | ||
Details | Website | 2024-10-01 | 41 | Building a Hands-on Active Directory Lab for Beginners | ||
Details | Website | 2024-09-23 | 0 | Significant hacktivist attacks launched against Russia | ||
Details | Website | 2024-09-12 | 6 | Active Directory Setup Guide: Installation and Configuration | ||
Details | Website | 2024-09-04 | 19 | Exploiting Exchange PowerShell After ProxyNotShell: Part 1 - MultiValuedProperty | ||
Details | Website | 2024-08-28 | 44 | BlackByte blends tried-and-true tradecraft with newly disclosed vulnerabilities to support ongoing attacks | ||
Details | Website | 2024-08-14 | 53 | SCCMSecrets.py: exploiting SCCM policies distribution for credentials harvesting, initial access and lateral movement | ||
Details | Website | 2024-07-02 | 5 | Pentesting results for 2023 | ||
Details | Website | 2024-07-01 | 9 | Tales From the Incident Response Cliff Face – Case Study 3 | ||
Details | Website | 2024-05-16 | 11 | Security Brief: Artificial Sweetener: SugarGh0st RAT Used to Target American Artificial Intelligence Experts | Proofpoint US | ||
Details | Website | 2024-04-24 | 2 | How to Secure Your Website: Top Tips From Enterprise Security Experts | ||
Details | Website | 2024-03-21 | 4 | Citrix ADC - Unexpected Treasure | ||
Details | Website | 2024-03-18 | 96 | Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks | ||
Details | Website | 2024-03-18 | 96 | Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks | ||
Details | Website | 2024-01-04 | 63 | ATT&CK을 이용해 스스로 평가하기(APT3, Second Scenario) | ||
Details | Website | 2023-12-06 | 198 | Russia/Ukraine Update - December 2023 | ||
Details | Website | 2023-11-28 | 81 | Aki-RATs - Command and Control Party |