Access password database


Attack:

1 Copy database files (USB, network drive, ftp, http) (OR)

1.1 Unprotected database (OR)
1.2 Protected database (Master password enabled)
1.2.1 Key logging (OR)
1.2.2 Guess password (use information from reconnaissance) (OR)
1.2.3 Brute force (OR)
1.2.4 Hybrid attack (OR)
1.2.5 Social engineering

2 View password database (through GUI)

2.1 Use an unattended logged-in machine (OR)
2.2 Shared system (OR)
2.3 Capture screen (remote monitoring)