๐Ÿ”‘

Credential Theft

Theft of authentication credentials through brute force, credential stuffing, keylogging, LSASS dumping, or password database compromise.

31 runbook nodes8 lifecycle stages covered

Triage

(4 nodes)

Containment

(3 nodes)

Preservation

(3 nodes)

Collection

(6 nodes)

Analysis

(3 nodes)

Eradication

(7 nodes)

Recovery

(2 nodes)

Post-Incident Review

(3 nodes)