Attack-Techniques
Credential Dumping — Post-Exploitation Identity Compromise Technique
Credential dumping is a post-exploitation technique used to extract authentication material from compromised systems. This SECMONS record explains how credential dumping works, its role in enterprise intrusions, and defensive detection strategies.
Data Exfiltration — Enterprise Data Theft & Extortion Technique
Data exfiltration is the unauthorized transfer of data from a compromised environment. This SECMONS record explains common exfiltration patterns, its role in ransomware operations, and defensive containment strategies.
Phishing — Enterprise Credential Harvesting & Initial Access Technique
Phishing is a social engineering technique used to obtain credentials, deliver malware, or establish initial access into enterprise environments. This SECMONS record explains phishing mechanics, campaign evolution, and defensive controls.