Threats Hidden in Office Network: Mechanism of Credential Harvesting for Lateral Movement
With the advent of the Internet of Things (IoT) era, the concept of smart office has gradually come true. To facilitate the management, IoT devices often follow authentication mechanisms as windows domain used, which would cause severe problems once hackers steal those credentials. This study analyz...
Enregistré dans:
| Auteurs principaux: | , , , |
|---|---|
| Format: | article |
| Langue: | EN |
| Publié: |
Atlantis Press
2021
|
| Sujets: | |
| Accès en ligne: | https://doaj.org/article/c5752a0fb27e4f6ea3770c78ffc9e0ac |
| Tags: |
Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!
|
| id |
oai:doaj.org-article:c5752a0fb27e4f6ea3770c78ffc9e0ac |
|---|---|
| record_format |
dspace |
| spelling |
oai:doaj.org-article:c5752a0fb27e4f6ea3770c78ffc9e0ac2021-11-17T09:01:14ZThreats Hidden in Office Network: Mechanism of Credential Harvesting for Lateral Movement10.2991/jrnal.k.210922.0081259613872352-6386https://doaj.org/article/c5752a0fb27e4f6ea3770c78ffc9e0ac2021-10-01T00:00:00Zhttps://www.atlantis-press.com/article/125961387/viewhttps://doaj.org/toc/2352-6386With the advent of the Internet of Things (IoT) era, the concept of smart office has gradually come true. To facilitate the management, IoT devices often follow authentication mechanisms as windows domain used, which would cause severe problems once hackers steal those credentials. This study analyzes the restriction of previous research and proposes a new technique that could cause credential leaks and organizes an attack mechanism to evaluate the most suitable strategy in various scenarios.Tung-Lin LeeI-Hsien LiuChu-Fen LiJung-Shian LiAtlantis PressarticleIWAactive directoryphishingcredential harvestingcybersecurityTechnologyTENJournal of Robotics, Networking and Artificial Life (JRNAL), Vol 8, Iss 3 (2021) |
| institution |
DOAJ |
| collection |
DOAJ |
| language |
EN |
| topic |
IWA active directory phishing credential harvesting cybersecurity Technology T |
| spellingShingle |
IWA active directory phishing credential harvesting cybersecurity Technology T Tung-Lin Lee I-Hsien Liu Chu-Fen Li Jung-Shian Li Threats Hidden in Office Network: Mechanism of Credential Harvesting for Lateral Movement |
| description |
With the advent of the Internet of Things (IoT) era, the concept of smart office has gradually come true. To facilitate the management, IoT devices often follow authentication mechanisms as windows domain used, which would cause severe problems once hackers steal those credentials. This study analyzes the restriction of previous research and proposes a new technique that could cause credential leaks and organizes an attack mechanism to evaluate the most suitable strategy in various scenarios. |
| format |
article |
| author |
Tung-Lin Lee I-Hsien Liu Chu-Fen Li Jung-Shian Li |
| author_facet |
Tung-Lin Lee I-Hsien Liu Chu-Fen Li Jung-Shian Li |
| author_sort |
Tung-Lin Lee |
| title |
Threats Hidden in Office Network: Mechanism of Credential Harvesting for Lateral Movement |
| title_short |
Threats Hidden in Office Network: Mechanism of Credential Harvesting for Lateral Movement |
| title_full |
Threats Hidden in Office Network: Mechanism of Credential Harvesting for Lateral Movement |
| title_fullStr |
Threats Hidden in Office Network: Mechanism of Credential Harvesting for Lateral Movement |
| title_full_unstemmed |
Threats Hidden in Office Network: Mechanism of Credential Harvesting for Lateral Movement |
| title_sort |
threats hidden in office network: mechanism of credential harvesting for lateral movement |
| publisher |
Atlantis Press |
| publishDate |
2021 |
| url |
https://doaj.org/article/c5752a0fb27e4f6ea3770c78ffc9e0ac |
| work_keys_str_mv |
AT tunglinlee threatshiddeninofficenetworkmechanismofcredentialharvestingforlateralmovement AT ihsienliu threatshiddeninofficenetworkmechanismofcredentialharvestingforlateralmovement AT chufenli threatshiddeninofficenetworkmechanismofcredentialharvestingforlateralmovement AT jungshianli threatshiddeninofficenetworkmechanismofcredentialharvestingforlateralmovement |
| _version_ |
1718425697999912960 |