Private Keys
Adversaries may search for private key certificate files on compromised systems for insecurely stored credentials. Private cryptographic keys and certificates are used for authentication, encryption/decryption, and digital signatures.(Citation: Wikipedia Public Key Crypto) Common key and certificate file extensions include: .key, .pgp, .gpg, .ppk., .p12, .pem, .pfx, .cer, .p7b, .asc. Adversaries may also look in common key directories, such as <code>~/.ssh</code> for SSH keys on * nix-based sy...
BY SOURCE
PROCEDURES (19)
Auto-extracted: 2 detections for process creation monitoring
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for powershell
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for encrypt
Auto-extracted: 1 detections for container
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for suspicious
Auto-extracted: 1 detections for privilege
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for container
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for authentication monitoring
Auto-extracted: 1 detections for script block
Auto-extracted: 1 detections for script block
Auto-extracted: 1 detections for general monitoring
Auto-extracted: 1 detections for service