Hunt for credential access techniques like LSASS dumping or browser credential theft. Use when searching for evidence of credential harvesting. Takes MITRE technique IDs and searches for behavioral indicators in SIEM.
Install with Tessl CLI
npx tessl i github:dandye/ai-runbooks --skill hunt-credential-access95
Does it follow best practices?
Validation for skill structure
Proactively hunt for MITRE ATT&CK Credential Access techniques (T1003, T1555, etc.) based on threat intelligence or hypothesis.
TECHNIQUE_IDS - Comma-separated MITRE technique IDs (e.g., "T1003.001,T1555.003")TIME_FRAME_HOURS - Lookback period (default: 72)TARGET_SCOPE_QUERY - UDM query to narrow scopeHUNT_HYPOTHESIS - Reason for the huntHUNT_CASE_ID - SOAR case for tracking| Technique | Description |
|---|---|
| T1003.001 | LSASS Memory |
| T1003.002 | Security Account Manager |
| T1003.003 | NTDS |
| T1003.004 | LSA Secrets |
| T1003.005 | Cached Domain Credentials |
| T1003.006 | DCSync |
| T1555.001 | Keychain |
| T1555.003 | Credentials from Web Browsers |
| T1555.004 | Windows Credential Manager |
For each technique in TECHNIQUE_IDS:
gti-mcp.get_threat_intel(query="Explain MITRE ATT&CK technique T1003.001")Understand:
T1003.001 - LSASS Memory Access:
metadata.event_type = "PROCESS_LAUNCH" AND
target.process.file.full_path = "C:\\Windows\\System32\\lsass.exe"Look for suspicious parent processes accessing lsass.exe.
T1003.001 - Known Dumping Tools:
metadata.event_type = "PROCESS_LAUNCH" AND
(principal.process.command_line CONTAINS "mimikatz" OR
principal.process.command_line CONTAINS "procdump" OR
principal.process.command_line CONTAINS "sekurlsa")T1555.003 - Browser Credential Files:
metadata.event_type = "FILE_OPEN" AND
(target.file.full_path CONTAINS "Login Data" OR
target.file.full_path CONTAINS "Web Data" OR
target.file.full_path CONTAINS "cookies.sqlite") AND
principal.process.file.full_path NOT IN ("chrome.exe", "firefox.exe", "msedge.exe")T1003.006 - DCSync:
metadata.event_type = "DOMAIN_CONTROLLER_REPLICATION" AND
principal.hostname NOT IN @known_domain_controllersGeneral - Credential Dumping Tools:
metadata.event_type = "PROCESS_LAUNCH" AND
(target.process.file.full_path CONTAINS "mimikatz" OR
target.process.file.full_path CONTAINS "lazagne" OR
target.process.file.full_path CONTAINS "pypykatz")Combine with TARGET_SCOPE_QUERY if provided.
secops-mcp.search_security_events(text=query, hours_back=TIME_FRAME_HOURS)Look for:
If suspicious events found:
secops-mcp.lookup_entity(entity_value=USER_OR_HOST)For file hashes:
gti-mcp.get_file_report(hash=HASH)Use /document-in-case:
Credential theft confirmed:
→ Trigger /respond-compromised-account for affected users
→ Escalate to incident response
→ Consider password resets for exposed credentials
No findings: → Document negative results → Confirm detection coverage for these techniques
After completing this skill, you MUST report these outputs:
| Output | Description |
|---|---|
FINDINGS | Detected credential access activity (events, processes, files accessed) |
DETECTED_TECHNIQUES | MITRE techniques observed (e.g., T1003.001, T1555.003) |
AFFECTED_ACCOUNTS | Accounts potentially compromised (users whose credentials may be exposed) |
If queries return no results, consider:
Document gaps for security engineering follow-up.
67a00be
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.