CISSP · · 4 min read

Identity Attacks and Defenses: How Attackers Exploit Identity and How to Stop Them

Attackers increasingly log in instead of breaking in. Learn credential stuffing, pass the hash, Kerberoasting, and the defenses that protect your identity infrastructure.

Title

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Identity Attacks and Defenses: How Attackers Exploit Identity and How to Stop Them

Hook / Why this matters

Attackers increasingly prefer to log in rather than break in. Stolen credentials and abused identity infrastructure sit at the center of many modern breaches. If you understand how these attacks work, you can build defenses that stop them before they turn into full compromise.

Core concept explained simply

Identity attacks focus on authenticating as someone else or abusing weaknesses in authentication protocols and infrastructure.

Credential stuffing and password spraying

Both exploit weak password practices and lack of multi factor authentication.

Phishing and social engineering for credentials

Phishing emails, fake login pages, and voice calls trick users into revealing passwords or approving malicious MFA prompts.

Attackers may:

Pass the hash and pass the ticket

In Windows and Active Directory environments, attackers focus on authentication tokens that are already present.

These techniques enable lateral movement after an initial foothold.

Kerberoasting and golden tickets

Kerberoasting targets service accounts:

Golden ticket attacks are even more severe:

Session hijacking and token theft

Modern web apps use session cookies and tokens. Attackers can:

CISSP lens

For the exam, focus on mapping each attack to defenses.

Many questions describe the symptoms of these attacks and ask which control is most effective. Choose answers that address root causes, not just surface symptoms.

Real world scenario

A company exposed a VPN portal to the internet that authenticated with usernames and passwords only. Attackers obtained a list of leaked credentials from several breaches and launched a credential stuffing campaign.

Several reused passwords worked. The attackers logged in as normal users, then:

From there, they exfiltrated sensitive data and created backdoor accounts.

A comprehensive fix required multiple layers:

Common mistakes and misconceptions

Actionable checklist

Key takeaways

Optional exam style reflection question

Question: An attacker steals the KRBTGT account hash in an Active Directory domain. What type of attack does this enable, and why is it so severe

Answer: It enables a golden ticket attack. With the KRBTGT hash, the attacker can forge valid Ticket Granting Tickets for any user and assign any group memberships or privileges. This effectively gives them long term, domain wide control until the KRBTGT password is reset twice and all forged tickets are invalidated.

Read next

© 2025 Threat On The Wire. All rights reserved.