Objective:

  • Steal account credentials or authentication tokens to expand access. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.


Linux Context:

  • Credential theft on Linux targets SSH keys (~/.ssh/id_rsa), password hashes (/etc/shadow), and memory-resident secrets. Attackers copy private keys, crack /etc/shadow with john or hashcat, or use mimipenguin to dump plaintext credentials from memory. Keylogging scripts hook into bash or PAM modules, while misconfigured services (e.g., Redis with no auth) leak creds. In cloud setups, attackers query instance metadata for temporary AWS credentials.


Key Techniques:

  • Unsecured Credentials (T1552): Harvesting SSH keys or config files.

  • Input Capture (T1056): Logging keystrokes via a modified PAM module.

  • OS Credential Dumping (T1003): Extracting /etc/shadow.

Flow Example:

  • Running cat /home/user/.ssh/id_rsa to steal a key or injecting a keylogger into /etc/pam.d/sshd.


Defender Strategies:

  • Encrypt SSH keys, restrict /etc/shadow access (chmod 600), and monitor syscal//library function tracers. Use MFA wherever possible.


The current list of corresponding EDRmetry test definitions includes:

  • EDR-T6201 - Dump credentials via unshadow

  • EDR-T6319 - Dump heap memory from Java

  • EDR-T6352 - Dump Passwords From Proc Memory with mimipenguin

  • EDR-T6242 - eBPF bcc Sniffs pam_get_authtok() with python3

  • EDR-T6288 - eBPF Capture TLS/SSL functions with Qtap

  • EDR-T6199 - eBPF pamspy

  • EDR-T6006 - eBPF Sniff pam_get_authtok() with bpftrace

  • EDR-T6269 - eBPF Sniff SSL/TLS Traffic

  • EDR-T6176 - eBPF Sniff PTY with bpftrace

  • EDR-T6299 - K8S - Dump etcd database

  • EDR-T6298 - K8S - Steal Pod Service Account Token

  • EDR-T6313 - Find local passwords/secrets

  • EDR-T6060 - Read /etc/shadow

  • EDR-T6012 - Sniff sshd with strace

  • EDR-T6314 - Scan bash_history to find pass/API keys

  • EDR-T6377 - K8S - Access Credentials in Environment Variables

  • EDR-T6378 - K8S - Access Credentials from ConfigMaps