T1040
Credential Access
Network Sniffing
Parses TCP-reassembled streams to extract plaintext credentials from FTP (USER/PASS on port 21), SMTP AUTH PLAIN/LOGIN (25/587), POP3 USER/PASS (110), IMAP LOGIN (143), Telnet username prompts (23), and PostgreSQL simple-auth (5432). Fires a critical-severity finding for each credential pair observed in cleartext, recording source IP, destination IP, and protocol to support immediate password rotation and access revocation.
T1110
Credential Access
Brute Force
Counts failed authentication responses per source IP: HTTP 401/403 errors, FTP 530 login-incorrect replies, and abnormally short-lived SSH and RDP sessions. When a single source accumulates threshold failures within 60 seconds, a high-severity finding fires. Failure counts are tracked independently per protocol and destination, enabling precise attribution even when an adversary distributes attempts across multiple services to avoid per-service lockout thresholds.
T1110.001
Credential Access
Brute Force: Password Guessing
Tracks authentication attempts per (source IP, target username) tuple across FTP, SMTP AUTH, POP3, IMAP, and Telnet sessions. When the same username receives multiple different password attempts from one source within the observation window, the analyzer concludes a dictionary or wordlist-based guessing campaign is underway. Fires once per unique (attacker, username, protocol) combination to prevent alert fatigue while still capturing all targeted accounts.
T1110.002
Credential Access
Brute Force: Password Cracking
Monitors Kerberos traffic on port 88 for two offline-cracking indicators. AS-REP Roasting fires when the KDC returns an AS-REP for an account with pre-authentication disabled — the encrypted response is crackable with hashcat or John the Ripper. Kerberoasting fires when a TGS-REP uses RC4 (etype 23) encryption for a service ticket, the weakest Kerberos cipher specifically chosen because it is offline-crackable.
T1110.003
Credential Access
Brute Force: Password Spraying
Distinguishes password spraying from per-account guessing by tracking attempts per source IP across multiple target usernames. When one source tries the same password against many different accounts on FTP, SMTP, or POP3 within a short window, the analyzer fires. This low-and-slow pattern bypasses per-account lockout policies and is a hallmark of targeted Active Directory credential attacks designed to evade security monitoring thresholds.
T1110.004
Credential Access
Brute Force: Credential Stuffing
Monitors HTTP POST requests to authentication endpoints (/login, /signin, /auth, /api/login) from a single source IP. When one IP sends more than a threshold of login POSTs within 60 seconds — each with different credential pairs — a high-severity finding fires. Covers both HTML form login and JSON API authentication, recording the endpoint path and request count for each finding to support application-layer blocking.
T1552.006
Credential Access
Unsecured Credentials: Group Policy Preferences
Parses SMB2 File Read requests on TCP 445 for SYSVOL Group Policy Preferences XML paths: Groups.xml, Services.xml, ScheduledTasks.xml, DataSources.xml, and Printers.xml. These files historically stored AES-encrypted local administrator passwords in a cpassword attribute whose key was published by Microsoft. Any host accessing these files triggers a critical-severity finding identifying the accessing IP and exact SYSVOL file path.
T1557.001
Credential Access
Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning
Detects LLMNR (UDP 5355) and NBT-NS (UDP 137) poisoning by correlating broadcast queries with responses from unexpected hosts. When a host other than the legitimate name owner answers an LLMNR or NBT-NS query, the analyzer flags a potential Responder-style attack. Adversaries use this technique to intercept NTLMv2 credential hashes from Windows clients, which can then be cracked offline or relayed to authenticated services.
T1557.002
Credential Access
Adversary-in-the-Middle: ARP Cache Poisoning
Identifies ARP Cache Poisoning by detecting gratuitous ARP and unsolicited ARP reply messages where a single MAC address claims ownership of multiple IP addresses, including the local gateway. High-rate conflicting ARP replies from one host are definitive evidence of an active man-in-the-middle setup. Fires a critical-severity finding identifying the poisoning host's MAC, the claimed IP addresses, and the targeted gateway.
T1558.001
Credential Access
Steal or Forge Kerberos Tickets: Golden Ticket
Parses Kerberos KRB5 packets on port 88 to detect Golden Ticket usage. Fires when a host sends a TGS-REQ (service ticket request) without a preceding AS-REQ (initial authentication) in the capture window — consistent with presenting a forged TGT generated offline using the KRBTGT account hash. The finding includes source IP, requested service principal name, and confidence score based on the absent authentication exchange.
T1558.003
Credential Access
Steal or Forge Kerberos Tickets: Kerberoasting
Detects Kerberoasting by parsing Kerberos TGS-REQ and TGS-REP packets on port 88. Fires when TGS-REQ messages specify RC4-HMAC (etype 23) encryption for service principal names — the weakest supported cipher, chosen specifically because RC4 hashes are offline-crackable with hashcat or Impacket. Also triggers on anomalous TGS-REQ volume from a single host indicating automated SPN enumeration with tools like Rubeus.