Anthropic-Cybersecurity-Skills hunting-credential-stuffing-attacks
'Detects credential stuffing attacks by analyzing authentication logs for login velocity anomalies, ASN diversity,
install
source · Clone the upstream repo
git clone https://github.com/mukul975/Anthropic-Cybersecurity-Skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/mukul975/Anthropic-Cybersecurity-Skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/hunting-credential-stuffing-attacks" ~/.claude/skills/mukul975-anthropic-cybersecurity-skills-hunting-credential-stuffing-attacks && rm -rf "$T"
manifest:
skills/hunting-credential-stuffing-attacks/SKILL.mdsource content
Hunting Credential Stuffing Attacks
When to Use
- When investigating security incidents that require hunting credential stuffing attacks
- When building detection rules or threat hunting queries for this domain
- When SOC analysts need structured procedures for this analysis type
- When validating security monitoring coverage for related attack techniques
Prerequisites
- Familiarity with security operations concepts and tools
- Access to a test or lab environment for safe execution
- Python 3.8+ with required dependencies installed
- Appropriate authorization for any testing activities
Instructions
Analyze authentication logs to detect credential stuffing by identifying patterns of distributed login failures, high IP diversity, and suspicious ASN distribution.
import pandas as pd from collections import Counter # Load auth logs df = pd.read_csv("auth_logs.csv", parse_dates=["timestamp"]) # Credential stuffing indicator: many IPs trying few accounts ip_per_account = df[df["status"] == "failed"].groupby("username")["source_ip"].nunique() accounts_under_attack = ip_per_account[ip_per_account > 50]
Key detection indicators:
- High unique source IPs per failed username
- Low success rate across many accounts (< 1%)
- ASN concentration from cloud/proxy providers
- Geographic impossibility (same account, distant locations)
- User-agent uniformity across distributed IPs
Examples
# Password spray: one password tried across many accounts spray = df[df["status"] == "failed"].groupby(["source_ip", "password_hash"]).agg( accounts=("username", "nunique")).reset_index() sprays = spray[spray["accounts"] > 10]