An attacker obtains a substantial set of usernames and passwords from public data leaks. They test each pair against a company's portal, hoping employees reused their credentials. Which approach best describes this activity?
Attackers here reuse known logins from external sources to see if they grant access. This approach aligns with credential stuffing, which leverages previously exposed account details to find a valid match. Brute force involves trying probable passwords for individual accounts, pass-the-ticket repurposes tokens from compromised systems, and password spraying tests a limited set of common passes across many accounts. The key is that the attacker has a huge list of actual username-password pairs from leaks, making credential stuffing the clear fit.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is credential stuffing?
Open an interactive chat with Bash
How does credential stuffing differ from brute force attacks?
Open an interactive chat with Bash
What measures can companies take to prevent credential stuffing?