Credential and Password Attacks

Key Takeaways

  • Credential attacks target authentication secrets, identity systems, session tokens, and user behavior.
  • Brute force attacks try many passwords for one or more accounts; password spraying tries a few common passwords across many accounts.
  • Credential stuffing uses known username/password pairs from another breach.
  • Phishing, smishing, vishing, and MFA fatigue target the user rather than the password database.
  • Mitigations include MFA, rate limiting, lockout policy, conditional access, password managers, monitoring, and credential rotation.
Last updated: April 2026

Credential and Password Attacks

Authentication attacks often look similar in logs. The exam expects you to distinguish the pattern and choose a mitigation that fits the pattern.

AttackPatternBest cluesUseful mitigations
Brute forceMany guesses against an account or serviceHigh failed attempts for one usernameLockout, rate limiting, MFA, block source
Password sprayingOne or a few common passwords across many usersLow failures per user, many usernamesDetect horizontal failures, MFA, banned password list
Credential stuffingReused breached credentialsSuccessful logins from unusual locationsMFA, breached password checks, anomaly detection
Dictionary attackWordlist-based guessingCommon words plus variationsStrong password policy, password manager
Rainbow tablePrecomputed hash crackingStolen unsalted hashesSalted slow hashes, protect credential stores
PhishingDeceptive message or siteUser reports link, fake login pageAwareness, filtering, FIDO2/passkeys, domain protections
MFA fatigueRepeated push promptsMany denied or ignored pushesNumber matching, rate limits, phishing-resistant MFA
Shoulder surfingObserving secrets physicallyPublic area, visible screen or keypadPrivacy filters, user training, clean desk

Worked Log Example

EventUser countFailure patternLikely attack
1,900 failed logins for admin in 4 minutes1Many guesses against one userBrute force
450 users each fail once with "Spring2026!"450One password across many usersPassword spraying
17 successful logins from residential proxies using known employee emails17Valid pairs, unusual sourceCredential stuffing

The mitigation should match the attack. A simple account lockout might slow brute force, but it can create denial of service if applied too aggressively to password spraying. MFA and risk-based conditional access are stronger answers when valid credentials are being used from suspicious contexts.

Credential Storage and Cracking

WeaknessWhy it mattersBetter control
Plaintext passwordsImmediate disclosure if database is stolenNever store plaintext passwords
Fast unsalted hashEasy offline cracking and reuse lookupSalted adaptive hashing
Shared admin passwordOne compromise affects many systemsUnique privileged credentials or vaulting
Hardcoded secretSecret leaks with code or imageSecret manager and rotation
Long-lived tokenStolen token remains usefulShort lifetime, scope limits, revocation

Social Engineering Forms

FormChannel
PhishingEmail or web message
SmishingSMS or text message
VishingVoice call
Spear phishingTargeted phishing against a specific person or group
WhalingTargeted phishing against senior leaders

Common Traps

TrapCorrect reasoning
Treat every login failure spike as brute forceCheck whether failures concentrate on one account or spread across many
Rotate only the visible user's password after malwareTokens, browser sessions, API keys, and service credentials may also be exposed
Rely on SMS MFA for high-risk admin accessPhishing-resistant or app-based options with number matching are stronger
Store recovery codes in the same mailbox they protectRecovery material should be protected separately

Quick Drill

Pick the likely attack and control:

  1. One executive receives a fake DocuSign email leading to a cloned login page: spear phishing; use filtering, awareness, and phishing-resistant MFA.
  2. Hundreds of accounts fail once with "Password1!": password spraying; detect horizontal attempts and require MFA.
  3. A leaked database contains unsalted MD5 password hashes: offline cracking risk; migrate to salted adaptive hashing and force resets where needed.
Test Your Knowledge

A log shows one password attempted against hundreds of usernames, with only one or two failures per account. What attack is most likely?

A
B
C
D
Test Your Knowledge

Attackers use valid employee credentials from a previous unrelated breach to access a company portal. What is this called?

A
B
C
D
Test Your KnowledgeMulti-Select

Which controls best reduce credential stuffing risk? Select two.

Select all that apply

Multifactor authentication
Use of unsalted fast hashes
Detection of breached or reused passwords
Disabling all audit logs