Learn Password Attacks and Exploitation Frameworks (GCIH) with Interactive Flashcards

Master key concepts in Password Attacks and Exploitation Frameworks through our interactive flashcard system. Click on each card to reveal detailed explanations and enhance your understanding.

Password Hash Types and Identification

Password Hash Types and Identification is a critical skill for incident handlers and penetration testers. When attackers compromise systems, they often obtain password hashes rather than plaintext passwords. Understanding hash types enables proper cracking strategies and forensic analysis.

**Common Hash Types:**

1. **LM (LAN Manager) Hash** - A legacy Windows hash, 14 characters max, split into two 7-character DES-encrypted halves. Easily crackable and identified by its 32-character hexadecimal format, often with the second half as 'AAD3B435B51404EE' for passwords ≤7 characters.

2. **NTLM (NT LAN Manager) Hash** - The modern Windows hash using MD4 algorithm. Also 32 hex characters but significantly stronger than LM. Stored in the SAM database or Active Directory's NTDS.dit file.

3. **MD5** - Produces 32-character hex output. Common in web applications and Linux systems (as $1$ prefix in /etc/shadow).

4. **SHA-256/SHA-512** - Used in modern Linux distributions, identified by $5$ and $6$ prefixes respectively in /etc/shadow.

5. **bcrypt** - Identified by $2a$ or $2b$ prefix, includes built-in salting and configurable work factor. Common in modern web applications.

6. **Kerberos Hashes** - Including AS-REP and TGS-REP hashes ($krb5asrep$ and $krb5tgs$), critical in Active Directory attacks like Kerberoasting.

**Identification Methods:**

Tools like **hashid**, **hash-identifier**, and **hashcat's built-in identification** help determine hash types based on length, character set, prefixes, and structure. The format context (e.g., extracted from SAM, /etc/shadow, or a database) also provides valuable clues.

**Exploitation Frameworks:**

Tools like **Hashcat**, **John the Ripper**, and **Metasploit** support hundreds of hash types. Proper identification ensures the correct attack mode is selected, whether dictionary, brute-force, rule-based, or rainbow table attacks. Misidentifying a hash type wastes time and computational resources during engagements.

Password Cracking with Hashcat

Hashcat is one of the most powerful and widely used password cracking tools in cybersecurity, frequently covered in GCIH certification training. It is an advanced CPU and GPU-based password recovery utility that supports over 300 hashing algorithms, including MD5, SHA-1, SHA-256, NTLM, bcrypt, and many more.

**How Hashcat Works:**
Hashcat takes captured password hashes and attempts to recover the plaintext passwords by comparing computed hashes against the target hash. It leverages the massive parallel processing power of GPUs, making it significantly faster than CPU-only tools like John the Ripper.

**Attack Modes:**
1. **Dictionary Attack (Mode 0):** Uses a wordlist to compare hashes against known passwords.
2. **Combination Attack (Mode 1):** Combines words from multiple dictionaries.
3. **Brute-Force Attack (Mode 3):** Tries every possible character combination using masks.
4. **Rule-Based Attack:** Applies transformation rules to dictionary words (e.g., appending numbers, capitalizing letters).
5. **Hybrid Attack (Modes 6 & 7):** Combines dictionary and brute-force techniques.

**Common Usage in Incident Handling:**
Incident handlers use Hashcat to assess password strength during security audits, crack recovered hashes from compromised systems, and validate the effectiveness of password policies. During investigations, cracking extracted hashes helps determine the scope of a breach.

**Basic Syntax:**
`hashcat -m [hash_type] -a [attack_mode] [hash_file] [wordlist]`

For example, cracking NTLM hashes with a dictionary attack:
`hashcat -m 1000 -a 0 hashes.txt rockyou.txt`

**Key Considerations:**
- Hashcat supports session management for pausing and resuming attacks.
- Rule files like best64.rule dramatically improve cracking success rates.
- Salt-aware cracking is supported for salted hashes.
- Performance depends heavily on GPU hardware capabilities.

**Defensive Implications:**
Understanding Hashcat helps defenders implement stronger password policies, choose robust hashing algorithms like bcrypt or Argon2, enforce salting, and recognize the importance of multi-factor authentication to mitigate password-based attacks.

Password Guessing and Spray Attacks

Password Guessing and Spray Attacks are critical topics in the GCIH certification, falling under the broader category of password attacks and exploitation frameworks.

**Password Guessing** involves an attacker systematically attempting to authenticate to a system using commonly used passwords, default credentials, or passwords derived from reconnaissance about the target. Attackers may use wordlists, dictionaries, or customized password lists based on information gathered about the organization or individual. Tools like Hydra, Medusa, and Burp Suite are commonly used for automated password guessing against services such as SSH, RDP, HTTP, FTP, and SMB.

Traditional brute-force attacks try multiple passwords against a single account, which often triggers account lockout mechanisms. This is where **Password Spray Attacks** become strategically valuable.

**Password Spray Attacks** take a different approach by attempting a single commonly used password (e.g., 'Spring2024!' or 'Company123') against many accounts simultaneously before moving to the next password. This technique deliberately stays below account lockout thresholds by spacing attempts across time and targeting a wide range of usernames. It is particularly effective against organizations using Active Directory, cloud services like Office 365, and federated authentication systems.

Password spraying exploits the statistical likelihood that at least one user in a large organization uses a weak or predictable password. Attackers often leverage enumerated username lists obtained through OSINT, LinkedIn scraping, or directory harvesting.

**Detection and Mitigation:**
- Monitor for distributed failed login attempts across multiple accounts from single or few source IPs
- Implement multi-factor authentication (MFA)
- Enforce strong password policies prohibiting common patterns
- Use smart lockout policies and conditional access rules
- Deploy tools like Azure AD Smart Lockout or SIEM correlation rules
- Regularly audit for compromised credentials using breach databases

Understanding these techniques enables incident handlers to recognize attack patterns, respond effectively, and implement preventive controls to protect organizational assets.

Online vs Offline Password Attacks

Online and offline password attacks are two fundamental categories of password cracking techniques covered in the GCIH certification.

**Online Password Attacks** involve actively interacting with a live authentication service or system in real-time. The attacker sends login attempts directly to the target service (e.g., SSH, RDP, web login portals, FTP). Tools like Hydra, Medusa, and Ncrack are commonly used for these attacks. Online attacks are inherently slower because they depend on network latency, server response times, and are often limited by account lockout policies, rate limiting, CAPTCHA mechanisms, and intrusion detection systems (IDS). Techniques include brute force, dictionary attacks, password spraying, and credential stuffing. Password spraying is particularly effective online because it tries one password across many accounts, avoiding lockout thresholds.

**Offline Password Attacks** occur when an attacker has already obtained password hashes or encrypted password data (e.g., from a compromised database, SAM file, /etc/shadow, or NTDS.dit). The attacker then attempts to crack these hashes locally without interacting with the target system. Tools like Hashcat, John the Ripper, and rainbow table generators are used. Offline attacks are significantly faster because they leverage local CPU/GPU processing power without network constraints or lockout policies. Techniques include brute force, dictionary attacks, rule-based attacks, rainbow table lookups, and hybrid attacks.

**Key Differences:**
- Speed: Offline attacks are exponentially faster due to local computation.
- Detection: Online attacks are more easily detected through logging and monitoring; offline attacks are virtually undetectable.
- Prerequisites: Online attacks require network access to the service; offline attacks require prior access to password hashes.
- Countermeasures: Online attacks are mitigated by lockout policies and MFA; offline attacks are countered by strong hashing algorithms (bcrypt, Argon2), salting, and longer/complex passwords.

Understanding both attack types is essential for incident handlers to implement appropriate defenses and recognize indicators of compromise during investigations.

Pass-the-Hash and Credential Relay

Pass-the-Hash (PtH) and Credential Relay are critical attack techniques frequently covered in the GCIH certification, both exploiting weaknesses in authentication mechanisms.

**Pass-the-Hash (PtH):**
Pass-the-Hash is a technique where an attacker captures the NTLM hash of a user's password from memory (using tools like Mimikatz) or from the SAM database, and then uses that hash directly to authenticate to remote systems without needing to know the plaintext password. This works because Windows NTLM authentication relies on hash comparisons rather than plaintext passwords. The attacker extracts hashes from compromised systems using tools like Mimikatz, secretsdump.py, or fgdump, then passes them to authenticate laterally across the network. PtH is particularly devastating in environments where local administrator passwords are reused across multiple machines, allowing attackers to move laterally with ease. Mitigation strategies include using Credential Guard, disabling NTLM where possible, implementing Local Administrator Password Solution (LAPS), and enforcing least-privilege principles.

**Credential Relay (NTLM Relay):**
Credential Relay, commonly known as NTLM Relay, involves an attacker intercepting authentication requests and forwarding (relaying) them to another target server. Unlike PtH, the attacker doesn't need to crack or even possess the hash—they act as a man-in-the-middle, capturing authentication traffic and replaying it in real-time. Tools like Responder and ntlmrelayx are commonly used. The attacker poisons name resolution protocols (LLMNR, NBT-NS) to intercept authentication attempts, then relays those credentials to access resources such as SMB shares, Exchange servers, or Active Directory. Mitigations include enabling SMB signing, disabling LLMNR/NBT-NS, enforcing EPA (Extended Protection for Authentication), and implementing Kerberos over NTLM.

Both techniques are integral to exploitation frameworks like Metasploit, Impacket, and CrackMapExec. Understanding these attacks is essential for incident handlers to detect lateral movement, investigate breaches, and implement effective defensive measures in enterprise environments.

Microsoft 365 Authentication Attacks

Microsoft 365 Authentication Attacks are a critical area of focus in the GCIH certification, as Microsoft 365 (M365) is one of the most widely used cloud platforms in enterprise environments, making it a prime target for adversaries.

**Common Attack Vectors:**

1. **Password Spraying:** Attackers attempt a few commonly used passwords against many accounts simultaneously, avoiding account lockout thresholds. This is highly effective against M365 tenants that lack strong password policies.

2. **Credential Stuffing:** Leveraging previously breached username/password combinations from other services, attackers exploit password reuse to gain unauthorized access to M365 accounts.

3. **Brute Force Attacks:** Systematic attempts to guess passwords, often targeting legacy authentication protocols like IMAP, POP3, and SMTP, which may bypass Multi-Factor Authentication (MFA) requirements.

4. **Token Theft and Replay:** Attackers steal OAuth tokens or session cookies through phishing, malware, or man-in-the-middle attacks, allowing them to bypass authentication entirely.

5. **Adversary-in-the-Middle (AiTM) Phishing:** Sophisticated phishing frameworks like Evilginx2 proxy authentication requests between the victim and Microsoft's login portal, capturing both credentials and session tokens in real-time, effectively bypassing MFA.

6. **Legacy Protocol Exploitation:** Older protocols that don't support modern authentication can be exploited to authenticate without MFA enforcement.

**Exploitation Frameworks:**
Tools like MSOLSpray, Ruler, AADInternals, and MFASweep are commonly used to enumerate users, spray passwords, and exploit M365 services.

**Mitigation Strategies:**
- Enforce MFA across all accounts and disable legacy authentication
- Implement Conditional Access Policies
- Enable Azure AD Identity Protection for risk-based sign-in detection
- Monitor sign-in logs for anomalous activity
- Use passwordless authentication methods
- Deploy FIDO2 security keys to counter AiTM attacks

Understanding these attacks is essential for incident handlers to detect, respond to, and prevent unauthorized access to cloud-based enterprise environments.

Cloud Credential Security

Cloud Credential Security is a critical topic within the GCIH domain, particularly as organizations increasingly migrate infrastructure and services to cloud platforms like AWS, Azure, and Google Cloud. In the context of password attacks and exploitation frameworks, cloud credential security addresses the protection, management, and potential exploitation of authentication tokens, API keys, access keys, and passwords used to access cloud resources.

Attackers frequently target cloud credentials through various methods including phishing, credential stuffing, brute-force attacks, and exploitation of misconfigured services. Common attack vectors include harvesting credentials from exposed metadata services (such as AWS EC2 instance metadata at 169.254.169.254), exploiting leaked credentials in public code repositories (GitHub, GitLab), stealing tokens from compromised endpoints, and leveraging overly permissive IAM (Identity and Access Management) policies.

Exploitation frameworks like Metasploit, Pacu (AWS exploitation framework), and CloudBrute have modules specifically designed to enumerate, extract, and abuse cloud credentials. Tools like Mimikatz can extract Azure AD tokens from memory, while specialized utilities like ScoutSuite and Prowler help identify credential misconfigurations.

Key defensive measures include implementing Multi-Factor Authentication (MFA) for all cloud accounts, enforcing the principle of least privilege through granular IAM policies, rotating credentials regularly, using temporary security tokens instead of long-lived access keys, and monitoring for anomalous API activity through services like AWS CloudTrail or Azure Monitor.

Organizations should also implement secrets management solutions (HashiCorp Vault, AWS Secrets Manager) to avoid hardcoding credentials, enable conditional access policies, and deploy Cloud Access Security Brokers (CASBs) for visibility. Incident handlers must understand how to detect credential compromise through log analysis, investigate lateral movement across cloud environments, and respond effectively by revoking compromised tokens and keys.

Understanding cloud credential security is essential for GCIH professionals as the attack surface expands beyond traditional on-premises environments, requiring updated skills to defend against sophisticated cloud-focused adversaries.

Metasploit Framework Operations

The Metasploit Framework is a powerful open-source exploitation platform widely used by penetration testers and incident handlers to identify vulnerabilities, develop exploits, and test security defenses. Understanding its operations is critical for GCIH professionals both for offensive assessment and defensive awareness.

**Core Components:**
Metasploit consists of modules categorized as exploits, payloads, auxiliary modules, encoders, and post-exploitation modules. Exploits target specific vulnerabilities, payloads define what executes upon successful exploitation (e.g., reverse shells, Meterpreter sessions), auxiliary modules handle scanning and fuzzing, and encoders help evade detection.

**Password Attack Capabilities:**
Metasploit provides robust password attack functionality through auxiliary modules like `auxiliary/scanner/ssh/ssh_login`, `auxiliary/scanner/smb/smb_login`, and others that perform brute-force and credential-stuffing attacks against various services. It integrates with wordlists and supports pass-the-hash techniques, allowing attackers to authenticate using NTLM hashes without cracking them.

**Meterpreter and Post-Exploitation:**
Once access is gained, Meterpreter provides advanced post-exploitation capabilities including credential harvesting using modules like `hashdump` to extract password hashes, `mimikatz/kiwi` for plaintext credential extraction from memory, and token impersonation for privilege escalation.

**Framework Operations Workflow:**
1. **Reconnaissance** - Using auxiliary scanners to identify targets and services
2. **Exploitation** - Selecting and configuring appropriate exploits and payloads
3. **Post-Exploitation** - Pivoting, privilege escalation, and credential harvesting
4. **Persistence** - Establishing backdoors for continued access

**Key Commands:**
- `msfconsole` launches the interface
- `search` finds relevant modules
- `use` selects a module
- `set/show options` configures parameters
- `exploit/run` executes the attack

**Defensive Relevance:**
GCIH professionals must understand Metasploit operations to recognize attack signatures, analyze incident artifacts, detect Meterpreter traffic patterns, and implement appropriate countermeasures such as network segmentation, intrusion detection rules, and credential protection mechanisms. Recognizing Metasploit-generated indicators of compromise is essential for effective incident response.

Exploitation and Payload Delivery

Exploitation and Payload Delivery are critical concepts in the GCIH certification, forming the core of how attackers compromise systems and establish control over targets.

**Exploitation** refers to the process of leveraging identified vulnerabilities in systems, applications, or services to gain unauthorized access. This involves using specific exploit code that targets known weaknesses such as buffer overflows, SQL injection, unpatched software vulnerabilities, or misconfigurations. Exploitation frameworks like Metasploit significantly streamline this process by providing a structured environment with pre-built exploit modules, making it easier for both penetration testers and malicious actors to identify and exploit vulnerabilities.

**Payload Delivery** is the mechanism by which malicious code (the payload) is transmitted to and executed on the target system after successful exploitation. Payloads define what happens after a vulnerability is exploited. Common payload types include:

- **Reverse Shells**: The compromised system connects back to the attacker, bypassing firewalls.
- **Bind Shells**: The target opens a listening port for the attacker to connect.
- **Meterpreter**: An advanced, in-memory payload offering extensive post-exploitation capabilities like privilege escalation, lateral movement, and data exfiltration.
- **Staged vs. Stageless Payloads**: Staged payloads deliver in parts (a small stager first, then the full payload), while stageless payloads deliver everything at once.

Delivery methods include phishing emails with malicious attachments, drive-by downloads, watering hole attacks, USB drops, and direct network exploitation. Attackers often encode or encrypt payloads to evade antivirus and intrusion detection systems.

In password attacks specifically, exploitation may involve using cracked credentials to authenticate to services, then delivering payloads through legitimate access channels like SSH, RDP, or SMB.

Incident handlers must understand these techniques to effectively detect exploitation attempts through log analysis, network monitoring, and endpoint detection tools, enabling rapid response and containment of security incidents before attackers achieve their objectives.

Offensive AI Attack Techniques

Offensive AI Attack Techniques represent an evolving frontier in cybersecurity where adversaries leverage artificial intelligence and machine learning to enhance the sophistication, speed, and effectiveness of their attacks. In the context of GCIH and password attacks/exploitation frameworks, these techniques are critically important to understand.

**AI-Enhanced Password Attacks:** Attackers use AI models trained on massive breach datasets to generate highly probable password candidates. Tools like PassGAN utilize Generative Adversarial Networks (GANs) to create password guesses that mimic real human password patterns, significantly outperforming traditional rule-based or brute-force approaches. These AI models learn password structures, common substitutions, and cultural patterns, making credential attacks far more efficient.

**Automated Exploitation:** AI-driven exploitation frameworks can automatically identify vulnerabilities, select appropriate exploits, and adapt attack strategies in real-time. Machine learning algorithms can analyze target environments and autonomously choose the optimal attack path, reducing the skill level required for sophisticated attacks.

**Evasion Techniques:** AI enables attackers to craft payloads that evade detection by security tools. Adversarial machine learning can generate malware variants that bypass antivirus engines, IDS/IPS systems, and behavioral analysis tools by understanding and manipulating the detection models.

**Social Engineering Enhancement:** AI powers deepfake voice and video generation, advanced phishing email creation using large language models, and automated spear-phishing campaigns that are contextually aware and highly convincing. These techniques facilitate credential harvesting at scale.

**Intelligent Reconnaissance:** AI automates OSINT gathering, correlates data from multiple sources, and identifies high-value targets and attack surfaces more efficiently than manual methods.

**Adaptive Attacks:** AI-powered tools can modify their behavior based on defensive responses, automatically pivoting strategies when blocked, and learning from failed attempts to improve subsequent attacks.

For incident handlers, understanding these techniques is essential for developing effective detection strategies, implementing AI-aware defense mechanisms, and responding to increasingly sophisticated threats that leverage artificial intelligence as a force multiplier in the attack lifecycle.

Password Defense and Multi-Factor Authentication

Password Defense and Multi-Factor Authentication (MFA) are critical components of a robust security strategy, particularly relevant to GCIH professionals who must understand both attack vectors and defensive measures against password-based threats.

**Password Defense** encompasses multiple layers of protection designed to mitigate password attacks such as brute force, dictionary attacks, credential stuffing, password spraying, and rainbow table attacks. Key defensive strategies include:

- **Strong Password Policies**: Enforcing minimum length (12+ characters), complexity requirements, and prohibiting commonly used passwords. NIST SP 800-63B recommends focusing on length over complexity.
- **Account Lockout Policies**: Temporarily locking accounts after a defined number of failed login attempts to thwart brute-force attacks.
- **Password Hashing and Salting**: Storing passwords using strong hashing algorithms (bcrypt, scrypt, Argon2) with unique salts to prevent rainbow table and precomputation attacks.
- **Rate Limiting**: Throttling authentication attempts to slow automated attacks.
- **Credential Monitoring**: Checking passwords against known breach databases to prevent use of compromised credentials.

**Multi-Factor Authentication (MFA)** adds additional verification layers beyond passwords, requiring users to provide two or more factors from different categories:

1. **Something You Know** – Password or PIN
2. **Something You Have** – Hardware token, smart card, or mobile authenticator app
3. **Something You Are** – Biometrics such as fingerprints or facial recognition

MFA significantly reduces the risk of unauthorized access even if passwords are compromised. For incident handlers, understanding MFA bypass techniques (phishing for OTP codes, SIM swapping, MFA fatigue attacks, and adversary-in-the-middle proxies like Evilginx2) is essential for both detection and response.

Best practices include implementing phishing-resistant MFA solutions such as FIDO2/WebAuthn hardware keys, enforcing MFA across all critical systems, and monitoring for anomalous authentication patterns. Together, strong password defenses and MFA create a defense-in-depth approach that substantially raises the barrier for attackers attempting credential-based exploitation.

Detecting Exploitation Tools

Detecting exploitation tools is a critical skill for incident handlers, as attackers frequently leverage frameworks like Metasploit, Cobalt Strike, Empire, and other post-exploitation tools to compromise systems. Effective detection involves multiple layers of monitoring and analysis.

**Network-Based Detection:**
Exploitation tools generate distinctive network signatures. Intrusion Detection Systems (IDS) like Snort and Suricata contain rules to identify known exploit payloads, Meterpreter communications, and beacon traffic from tools like Cobalt Strike. Analysts should monitor for unusual outbound connections, encoded or encrypted C2 (Command and Control) channels, and anomalous traffic patterns such as periodic beaconing at regular intervals.

**Host-Based Detection:**
Endpoint Detection and Response (EDR) solutions can identify suspicious process behavior, such as process injection, privilege escalation attempts, and credential dumping (e.g., Mimikatz). Key indicators include unusual parent-child process relationships, PowerShell executing encoded commands, rundll32 or regsvr32 loading unexpected DLLs, and processes accessing LSASS memory.

**Signature-Based Detection:**
Antivirus and anti-malware tools maintain signatures for known exploitation frameworks. However, attackers often obfuscate payloads using encoders, packers, and custom loaders to evade signature detection, making this approach necessary but insufficient alone.

**Behavioral Analysis:**
Monitoring for behaviors typical of exploitation tools is essential. This includes detecting lateral movement patterns, unusual SMB or WMI activity, pass-the-hash or pass-the-ticket attacks, and abnormal service installations.

**Log Analysis:**
SIEM platforms aggregate and correlate logs from multiple sources. Windows Event Logs (especially Security, PowerShell, and Sysmon logs) provide valuable evidence of exploitation tool usage, including Event IDs 4688 (process creation), 4624/4625 (logon events), and PowerShell script block logging.

**Threat Intelligence:**
Integrating indicators of compromise (IOCs) such as known C2 IP addresses, domain names, file hashes, and YARA rules helps identify exploitation frameworks proactively.

A defense-in-depth approach combining these methods significantly improves an organization's ability to detect and respond to exploitation tool usage before significant damage occurs.

More Password Attacks and Exploitation Frameworks questions
720 questions (total)